Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

PCI ISA Test Prep 100% Correct Answers Verified Latest 2024 Version

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
03-07-2024
Written in
2023/2024

PCI ISA Test Prep | 100% Correct Answers | Verified | Latest 2024 Version QSAs must retain work papers for a minimum of _______ years. It is a recommendation for ISAs to do the same. - 3 According to PCI DSS requirement 1, Firewall and router rule sets need to be reviewed every _____ months. - 6 At least ______________ and prior to the annual assessment the assessed entity: - Identifies all locations and flows of cardholder data to verify they are included in the CDE - Confirms the accuracy of their PCI DSS scope - Retains their scoping documentation for assessor reference - annually scope includes - ppl process, tech Evidence Retention It is recommended that the ISA secure and maintain digital and/or hard copies of case logs, audit results and work papers, notes, and any technical information that was created and/or obtained during the PCI Data Security Assessment for a minimum of ________ or as applicable to company data retention policies - of three (3) years A (time) ______ process for identifying and securely deleting stored cardholder data that exceeds defined retention requirements. - quarterly Do not store SAD after ____________ (even if encrypted). (track data / cvc / pin) - authorization manual clear-text key-management procedures specify processes for the use of the following - Split knowledge.Dual control

Show more Read less
Institution
Course

Content preview

PCI ISA Test Prep | 100% Correct Answers |
Verified | Latest 2024 Version
QSAs must retain work papers for a minimum of _______ years. It is a recommendation for ISAs to do
the same. - ✔✔3



According to PCI DSS requirement 1, Firewall and router rule sets need to be reviewed every _____
months. - ✔✔6



At least ______________ and prior to the annual assessment the assessed entity:



- Identifies all locations and flows of cardholder data to verify they are included in the CDE

- Confirms the accuracy of their PCI DSS scope

- Retains their scoping documentation for assessor reference - ✔✔annually



scope includes - ✔✔ppl process, tech



Evidence Retention

It is recommended that the ISA secure and maintain digital and/or hard copies of case logs, audit results
and work papers, notes, and any technical information that was created and/or obtained during the PCI
Data Security Assessment for a minimum of ________ or as applicable to company data retention
policies - ✔✔of three (3) years



A (time) ______ process for identifying and securely deleting stored cardholder data that exceeds
defined retention requirements. - ✔✔quarterly



Do not store SAD after ____________ (even if encrypted). (track data / cvc / pin) - ✔✔authorization



manual clear-text key-management procedures specify processes for the use of the following - ✔✔Split
knowledge.Dual control

, Dual control - ✔✔least two people are required to perform any key-management operations and no one
person has access to the authentication materials (for example, passwords or keys) of another



Split knowledge - ✔✔key components are under the control of at least two people who only have
knowledge of their own key components



PAN is rendered unreadable in which ways - ✔✔hash

mask

encrypt

pad



Ensure that all system components and software are protected from known vulnerabilities by installing
applicable vendor-supplied security patches. Install critical security patches within _____ of release. -
✔✔one month



Installation of all applicable vendor-supplied security patches within an ___________________ -
✔✔appropriate time frame (for example, within three months)



makes sure change control has these 4 things - ✔✔impack

testing (PCI review)

backout

approval



Train developers at least ________ in up-to-date secure coding techniques, including how to avoid
common coding vulnerabilities, and understanding how sensitive data is handled in memory. -
✔✔annually



Reviewing public-facing web applications via manual or automated application vulnerability security
assessment tools or methods, at least ___________________

Written for

Course

Document information

Uploaded on
July 3, 2024
Number of pages
6
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$8.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
hov
1.0
(2)

Get to know the seller

Seller avatar
hov State University Of West Georgia
Follow You need to be logged in order to follow users or courses
Sold
12
Member since
2 year
Number of followers
3
Documents
2125
Last sold
2 months ago
Academic Avengers

Expert Verified Exams {Latest Versions} 99% Pass Rate

1.0

2 reviews

5
0
4
0
3
0
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions