Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

PCI-DSS ISA Exam 100% Correct Answers Verified Latest 2024 Version

Beoordeling
-
Verkocht
-
Pagina's
6
Cijfer
A+
Geüpload op
03-07-2024
Geschreven in
2023/2024

PCI-DSS ISA Exam | 100% Correct Answers | Verified | Latest 2024 Version Perimeter firewalls installed ______________________________. - between all wireless networks and the CHD environment. Where should firewalls be installed? - At each Internet connection and between any DMZ and the internal network. Review of firewall and router rule sets at least every __________________. - 6 months If disk encryption is used - logical access must be managed separately and independently of native operating system authentication and access control mechanisms Manual clear-text key-management procedures specify processes for the use of the following: - Split knowledge AND Dual control of keys What is considered "Sensitive Authentication Data"? - Card verification value When a PAN is displayed to an employee who does NOT need to see the full PAN, the minimum digits to be masked are: All digits between the ___________ and the __________. - first 6; last 4 Regarding protection of PAN... - PAN must be rendered unreadable during the transmission over public and wireless networks. Under requirement 3.4, what method must be used to render the PAN unreadable? - Hashing the entire PAN using strong cryptography Weak security controls that should NOT be used - WEP, SSL, and TLS 1.0 or earlie

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

PCI-DSS ISA Exam | 100% Correct Answers |
Verified | Latest 2024 Version
Perimeter firewalls installed ______________________________. - ✔✔between all wireless networks
and the CHD environment.



Where should firewalls be installed? - ✔✔At each Internet connection and between any DMZ and the
internal network.



Review of firewall and router rule sets at least every __________________. - ✔✔6 months



If disk encryption is used - ✔✔logical access must be managed separately and independently of native
operating system authentication and access control mechanisms



Manual clear-text key-management procedures specify processes for the use of the following: - ✔✔Split
knowledge AND Dual control of keys



What is considered "Sensitive Authentication Data"? - ✔✔Card verification value



When a PAN is displayed to an employee who does NOT need to see the full PAN, the minimum digits to
be masked are: All digits between the ___________ and the __________. - ✔✔first 6; last 4



Regarding protection of PAN... - ✔✔PAN must be rendered unreadable during the transmission over
public and wireless networks.



Under requirement 3.4, what method must be used to render the PAN unreadable? - ✔✔Hashing the
entire PAN using strong cryptography



Weak security controls that should NOT be used - ✔✔WEP, SSL, and TLS 1.0 or earlier

, Per requirement 5, anti-virus technology must be deployed_________________ - ✔✔on all system
components commonly affected by malicious software.



Key functions for anti-vius program per Requirement 5: - ✔✔1) Detect

2) Remove

3) Protect



Anti-virus solutions may be temporarily disabled only if - ✔✔there is legitimate technical need, as
authorized by management on a case-by-case basis



When to install "critical" applicable vendor-supplied security patches? ---> within _________ of release. -
✔✔1 month



When to install applicable vendor-supplied security patches? - ✔✔within an appropriate time frame (for
example, within three months).



When assessing requirement 6.5, testing to verify secure coding techniques are in place to address
common coding vulnerabilities includes: - ✔✔Reviewing software development policies and procedures



Requirements 7 restricted access controls by: - ✔✔Need-to-know and least privilege



Inactive accounts over _____________days need to be removed or disabled. - ✔✔90 days



To verify user access termination policy, an ISA need to select a sample of user terminated in the past
_______________ months, and review current user access lists—for both local and remote access—to
verify that their IDs have been deactivated or removed from the access lists. - ✔✔6 months



How many logon attempts should be allowed until resulting temporarily account locked-out? - ✔✔6
attempts

Geschreven voor

Vak

Documentinformatie

Geüpload op
3 juli 2024
Aantal pagina's
6
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€7,53
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
hov
1,0
(2)

Maak kennis met de verkoper

Seller avatar
hov State University Of West Georgia
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
12
Lid sinds
2 jaar
Aantal volgers
3
Documenten
2125
Laatst verkocht
2 maanden geleden
Academic Avengers

Expert Verified Exams {Latest Versions} 99% Pass Rate

1,0

2 beoordelingen

5
0
4
0
3
0
2
0
1
2

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen