Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien
logo-home
Exam (elaborations) ISA 14,70 €   Ajouter au panier

Examen

Exam (elaborations) ISA

 1 vue  0 fois vendu
  • Établissement
  • ISA

Exam (elaborations) ISA For PCI DSS requirement 1, firewall and router rule sets need to be reviewed every _____________ months - CORRECT ANSWER 6 months Non-console administrator access to any web-based management interfaces must be encrypted with technology such as......... - CORRECT ANS...

[Montrer plus]

Aperçu 2 sur 9  pages

  • 12 mars 2023
  • 9
  • 2022/2023
  • Examen
  • Questions et réponses
  • pci isa
  • for pci dss requirement 1
Tous les documents sur ce sujet (209)
avatar-seller
EWLindy
PCI ISA Exam Verified 100%
Question And Answers 2022
For PCI DSS requirement 1, firewall and router rule sets need to be reviewed every
_____________ months - CORRECT ANSWER 6 months

Non-console administrator access to any web-based management interfaces must be
encrypted with technology such as......... - CORRECT ANSWER HTTPS

Requirements 2.2.2 and 2.2.3 cover the use of secure services, protocols and
daemons. Which of the following is considered to be secure? - CORRECT ANSWER
SSH, TLS, IPSEC, VPN

Which of the following is considered "Sensitive Authentication Data"? - CORRECT
ANSWER Card Verification Value (CAV2/CVC2/CVV2/CID), Full Track Data, PIN/PIN
Block

True or False: It is acceptable for merchants to store Sensitive Authentication after
authorization as long as it is strongly encrypted? - CORRECT ANSWER False

When a PAN is displayed to an employee who does NOT need to see the full PAN, the
minimum digits to be masked are: - CORRECT ANSWER All digits between the first six
and last four

Which of the following is true regarding protection of PAN? - CORRECT ANSWER PAN
must be rendered unreadable during transmission over public, wireless networks

Which of the following may be used to render PAN unreadable in order to meet
requirement 3.4? - CORRECT ANSWER Hashing the entire PAN using strong
cryptography, truncation, index tokens and pads with pads being securely stored, strong
cryptography with associated key-management processes and procedures

True or False Manual clear-text key-management procedures specify processes for the
use of keys that are stored on production systems, use of split knowledge and dual
control is required. - CORRECT ANSWER True

When assessing requirement 6.5, testing to verify secure coding techniques are in place
to address common coding vulnerabilities includes: - CORRECT ANSWER Examine
software development policies and procedures to verify that up-to-date training in

, secure coding techniques is required for developers at least annually, based on industry
best practices and guidance

One of the principles to be used when granting user access to systems in CDE is: -
CORRECT ANSWER Least privilege

An example of a "one-way" cryptographic function used to render data unreadable is: -
CORRECT ANSWER SHA-2

A set of cryptographic hash functions designed by the National Security Agency (NS). -
CORRECT ANSWER SHA-2 (Secure Hash Algorithm

Inactive user accounts should be either removed or disabled within___ - CORRECT
ANSWER 90 days

True or False: Procedures must be developed to easily distinguish the difference
between onsite personnel and visitors. - CORRECT ANSWER True

When should access be revoked of recently terminated employees? - CORRECT
ANSWER immediately

True or False: A visitor with a badge may enter sensitive area unescorted. - CORRECT
ANSWER False, visitors must be escorted at all times.

Protection of keys used for encryption of cardholder data against disclosure must
include at least: (4 items) - CORRECT ANSWER *Access to keys is restricted to the
fewest number of custodians necessary
*Key-encrypting keys are at least as strong as the data-encrypting keys they protect
*Key encrypting keys are stored separately from data-encrypting keys
*Keys are stored securely in the fewest possible locations

Description of cryptographic architecture includes: - CORRECT ANSWER *Details of all
algorithms, protocols, and keys used for the protection of cardholder data, including key
strength and expiry date
*Description of the key usage for each key
*Inventory of any HSMs and other SCDs used for key management

What 2 methods must NOT be used to be disk-level encryption compliant - CORRECT
ANSWER *Cannot use the same user account authenticator as the operating system
*Cannot use a decryption key that is associated with or derived from the systems local
user account database or general network login credentials.

6 months - CORRECT ANSWER DESV User accounts and access privileges are
reviewed at least every______

Les avantages d'acheter des résumés chez Stuvia:

Qualité garantie par les avis des clients

Qualité garantie par les avis des clients

Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.

L’achat facile et rapide

L’achat facile et rapide

Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.

Focus sur l’essentiel

Focus sur l’essentiel

Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.

Foire aux questions

Qu'est-ce que j'obtiens en achetant ce document ?

Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.

Garantie de remboursement : comment ça marche ?

Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.

Auprès de qui est-ce que j'achète ce résumé ?

Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur EWLindy. Stuvia facilite les paiements au vendeur.

Est-ce que j'aurai un abonnement?

Non, vous n'achetez ce résumé que pour 14,70 €. Vous n'êtes lié à rien après votre achat.

Peut-on faire confiance à Stuvia ?

4.6 étoiles sur Google & Trustpilot (+1000 avis)

67163 résumés ont été vendus ces 30 derniers jours

Fondée en 2010, la référence pour acheter des résumés depuis déjà 14 ans

Commencez à vendre!
14,70 €
  • (0)
  Ajouter