Complete Questions with Verified Answers | Grade A | 100%
Correct
What makes up SAD?
Track Data/ (CAV2/CVC2/CVV2/CID) / PINs & PIN Blocks
Track 1 vs Track 2
Track 1: contains all fields of both Track 1 and Track 2, up to 79 characters long
11.2 Internal Scans - Frequency and performed by who?
Quarterly and after significant changes in the network - Performed by qualified internal or
qualified external resource
11.3 Penetration Tests (SERVICE PROVIDERS) - Frequency and performed by who?
Every 6 months; qualified internal or external resource
11.2 External Scans - Frequency and performed by who?
Quarterly and after significant changes in the network - Performed by PCI SSC Approved
Scanning Vendor (ASV)
11.3 Penetration Tests - Frequency and performed by who?
At least annually and after significant changes in the network - Performed by qualified internal
or qualified external resource
, PCI - ISA Exam Study guide (New Update) |
Complete Questions with Verified Answers | Grade A | 100%
Correct
11.2 Review scan reports and verify scan process includes rescans until:
- External scans: no vulnerabilities exists that scored 4.0 or higher by the CVSS
- Internal scans: all high-risk vulnerabilities as defined in PCI DSS requirement 6.1 are resolved
Who decides if a ROC or SAQ is required?
payment brands / acquirers
10.2 Implement audit trails for all system components to reconstruct the following events:
- Individual accesses to CHD
- Actions taken by any invidivudal with root or admin privileges
- Access to all audit trails
- Invalid logical access attempts
- Use of identification and authentication mechanisms
- Initialization of the audit logs
- Creation and deleting of system-level objects
How long must QSA's retain work papers?
3 years, recommend the same for ISAs
Firewall and router rule sets must be reviewed every _ months
every 6 months
, PCI - ISA Exam Study guide (New Update) |
Complete Questions with Verified Answers | Grade A | 100%
Correct
Things to consider when assessing:
People, processes, technology
How often should an entity undergo a process to securely delete stored CHD that exceeds
defined retention requirements?
at least quarterly
3.6 Key-management operations
Dual Control: at least two people are required to perform any key-management operations and no
one person has access to the authentication materials (for example, passwords or keys) of another
Split Knowledge: key components are under the control of at least two people who only have
knowledge of their own key components
3.4 Pan is rendered unreadable in which ways?
hash, truncation, encrypt, index token and pads
6.2 Critical Security patches should be installed within _ of release.
one month
6.2 Installation of applicable vendor-supplied security patches (non-critical) should be installed: