Practice questions for this set
Terms in this set (62)
Perimeter firewalls installed between all wireless networks and the CHD environment.
______________________________.
Where should firewalls be installed? At each Internet connection and between any DMZ and the internal network.
Review of firewall and router rule sets at 6 months
least every____________ _.
PCI-DSS ISA Exam
logical access must be managed separately and independently of native operating
If disk encryption is used
system authentication and access control mechanisms
1/5
, 9/22/24, 3:41 PM
Manual clear-text key-management Split knowledge AND Dual control of keys
procedures specify processes for the use of
the following:
What is considered "Sensitive Authentication Card verification value
Data"?
When a PAN is displayed to an employee first 6; last 4
who does NOT need to see the full PAN, the
minimum digits to be masked are: All digits
between the ___________ and the_________ _.
PAN must be rendered unreadable during the transmission over public and wireless
Regarding protection of PAN...
networks.
Under requirement 3.4, what method must Hashing the entire PAN using strong cryptography
be used to render the PAN unreadable?
Weak security controls that should NOT be WEP, SSL, and TLS 1.0 or earlier
used
Per requirement 5, anti-virus technology on all system components commonly affected by malicious software.
must be deployed_________________
1) Detect
Key functions for anti-vius program per
2) Remove
Requirement 5:
3) Protect
Anti-virus solutions may be temporarily there is legitimate technical need, as authorized by management on a case-by-case
disabled only if basis
When to install "critical" applicable vendor- 1 month
supplied security patches? ---> within _________
of release.
When to install applicable vendor-supplied within an appropriate time frame (for example, within three months).
security patches?
When assessing requirement 6.5, testing to Reviewing software development policies and procedures
verify secure coding techniques are in place
to address common coding vulnerabilities
includes:
Requirements 7 restricted access controls Need-to-know and least privilege
by:
Inactive accounts over _________ days need 90 days
to be removed or disabled.
To verify user access termination policy, an 6 months
ISA need to select a sample of user
terminated in the past ____________ months,
and review current user access lists—for both
local and remote access—to verify that their
IDs have been deactivated or removed from
the access lists.
How many logon attempts should be 6 attempts
allowed until resulting temporarily account
locked-out?
PCI-DSS ISA Exam
2/5
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Denyss. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.79. You're not tied to anything after your purchase.