Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

PCI DSS 3.2.1 Test Questions 100% Correct Answers Verified Latest 2024 Version

Rating
-
Sold
-
Pages
24
Grade
A+
Uploaded on
03-07-2024
Written in
2023/2024

PCI DSS 3.2.1 Test Questions | 100% Correct Answers | Verified | Latest 2024 Version Which of the following does not belong? The following events should be included in automated audit trails for all system component: -Individual access to cardholder data -Creation and deletion of system-level objects -Invalid logical access attempts -Actions taken by user with root or administrative privileges -Changes, additions, or deletions to any account with root or administrative privileges -Audit trail access -Use of identification and authentication mechanisms -Elevation of privileges -Initialization of audit logs -Stopping or pausing of audit logs - All of these should be included. (Requirement 10.2.1 - 10.2.7) Which of the following does not belong? The following audit trail entries should be recorded for each event: -User identification -Type of event -Date and time -Success or failure -Origination of event -Identity of name of affected data, system component, or resource -Initializing, stopping, or pausing of audit logs - Initializing, stopping, or pausing of audit logs - this choice is part of what should be included in audit logs (10.2) This question pertains to 10.3 (10.3.1 - 10.3.6)How often should logs and security event reviews be conducted? - At least daily (10.6) How long should audit trail history be retained? At least ___ of history must be immediately available for analysis. - At least 1 year retained 3 months (10.7) How long should visitor logs for physical access be retained? - At least 3 months (9.4) Critical patches need to installed within ___ of release. - One month For public-facing web applications, which of the following is required? -Web application firewalls -Manual vulnerability assessment tools -Automated vulnerability assessment tools - Any one or more of these. According to Requirement 6.6, ensure that either one of the following methods is in place: 1. Web application firewalls - Examine system configuration settings to verify an automated technical solution that detects and prevents web-based attacks is in place. 2. Web application assessment - Verify that public-facing web applications are reviewed using with manual or automated vulnerability assessment tools or methods. How frequently should web application assessments be conducted? - At least annually and after any significant changes (6.6) Does an application vulnerability assessment have to be conducted by a third party? - No. As long as the reviewers specialize in application security and can demonstrate independence from the development team.

Show more Read less
Institution
Course

Content preview

PCI DSS 3.2.1 Test Questions | 100% Correct
Answers | Verified | Latest 2024 Version
Which of the following does not belong?

The following events should be included in automated audit trails for all system component:

-Individual access to cardholder data

-Creation and deletion of system-level objects

-Invalid logical access attempts

-Actions taken by user with root or administrative privileges

-Changes, additions, or deletions to any account with root or administrative privileges

-Audit trail access

-Use of identification and authentication mechanisms

-Elevation of privileges

-Initialization of audit logs

-Stopping or pausing of audit logs - ✔✔All of these should be included. (Requirement 10.2.1 - 10.2.7)



Which of the following does not belong?

The following audit trail entries should be recorded for each event:

-User identification

-Type of event

-Date and time

-Success or failure

-Origination of event

-Identity of name of affected data, system component, or resource

-Initializing, stopping, or pausing of audit logs - ✔✔Initializing, stopping, or pausing of audit logs - this
choice is part of what should be included in audit logs (10.2)



This question pertains to 10.3 (10.3.1 - 10.3.6)

,How often should logs and security event reviews be conducted? - ✔✔At least daily (10.6)



How long should audit trail history be retained?



At least ___ of history must be immediately available for analysis. - ✔✔At least 1 year retained



3 months

(10.7)



How long should visitor logs for physical access be retained? - ✔✔At least 3 months (9.4)



Critical patches need to installed within ___ of release. - ✔✔One month



For public-facing web applications, which of the following is required?

-Web application firewalls

-Manual vulnerability assessment tools

-Automated vulnerability assessment tools - ✔✔Any one or more of these. According to Requirement
6.6, ensure that either one of the following methods is in place:



1. Web application firewalls - Examine system configuration settings to verify an automated technical
solution that detects and prevents web-based attacks is in place.

2. Web application assessment - Verify that public-facing web applications are reviewed using with
manual or automated vulnerability assessment tools or methods.



How frequently should web application assessments be conducted? - ✔✔At least annually and after any
significant changes (6.6)



Does an application vulnerability assessment have to be conducted by a third party? - ✔✔No. As long as
the reviewers specialize in application security and can demonstrate independence from the
development team.

, What is NOT included in cardholder data?

-Primary Account Number (PAN)

-PIN

-Cardholder Name

-Expiration Date

-CVV

-Service Code - ✔✔PIN and CVV are both considered sensitive authentication data.



Which of the following CAN BE stored?

-Full track data

-PAN

-Cardholder Name

-Service Code

-PIN

-Expiration Date

-CVV - ✔✔PAN, cardholder name, service code, and expiration date can be stored (requirement 3).
However, storage should be limited to only required amount of time and purged when no longer needed
or at least quarterly. (3.1)



Sensitive authentication data cannot be stored after authorization (3.2).



Can full Track 1 data be stored? - ✔✔No. Track 1 data contains all fields of Track 2 data plus the
cardholder name and additional information for proprietary use by the issuer. It is generally a violation to
store anything to the right of the service code.



It is not permitted to store full track data or other sensitive authentication data after authorization.



Which SAQ applies to SERVICE PROVIDERS? - ✔✔SAQ D

Written for

Course

Document information

Uploaded on
July 3, 2024
Number of pages
24
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$8.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
hov
1.0
(2)

Get to know the seller

Seller avatar
hov State University Of West Georgia
Follow You need to be logged in order to follow users or courses
Sold
12
Member since
2 year
Number of followers
3
Documents
2125
Last sold
2 months ago
Academic Avengers

Expert Verified Exams {Latest Versions} 99% Pass Rate

1.0

2 reviews

5
0
4
0
3
0
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions