PCI-DSS ISA Exam
Perimeter firewalls installed ______________________________. - correct answer
between all wireless networks and the CHD environment.
Where should firewalls be installed? - correct answer At each Internet connection and
between any DMZ and the internal network.
Review of firewall and router rule sets at least every __________________. - correct
answer 6 months
If disk encryption is used - correct answer logical access must be managed separately
and independently of native operating system authentication and access control
mechanisms
Manual clear-text key-management procedures specify processes for the use of the
following: - correct answer Split knowledge AND Dual control of keys
What is considered "Sensitive Authentication Data"? - correct answer Card verification
value
When a PAN is displayed to an employee who does NOT need to see the full PAN, the
minimum digits to be masked are: All digits between the ___________ and the
__________. - correct answer first 6; last 4
Regarding protection of PAN... - correct answer PAN must be rendered unreadable
during the transmission over public and wireless networks.
Under requirement 3.4, what method must be used to render the PAN unreadable? -
correct answer Hashing the entire PAN using strong cryptography
Weak security controls that should NOT be used - correct answer WEP, SSL, and
TLS 1.0 or earlier
Per requirement 5, anti-virus technology must be deployed_________________ -
correct answer on all system components commonly affected by malicious software.
Key functions for anti-vius program per Requirement 5: - correct answer 1) Detect
2) Remove
3) Protect
Anti-virus solutions may be temporarily disabled only if - correct answer there is
legitimate technical need, as authorized by management on a case-by-case basis
, When to install "critical" applicable vendor-supplied security patches? ---> within
_________ of release. - correct answer 1 month
When to install applicable vendor-supplied security patches? - correct answer within
an appropriate time frame (for example, within three months).
When assessing requirement 6.5, testing to verify secure coding techniques are in place
to address common coding vulnerabilities includes: - correct answer Reviewing
software development policies and procedures
Requirements 7 restricted access controls by: - correct answer Need-to-know and
least privilege
Inactive accounts over _____________days need to be removed or disabled. - correct
answer 90 days
To verify user access termination policy, an ISA need to select a sample of user
terminated in the past _______________ months, and review current user access lists
—for both local and remote access—to verify that their IDs have been deactivated or
removed from the access lists. - correct answer 6 months
How many logon attempts should be allowed until resulting temporarily account locked-
out? - correct answer 6 attempts
Once user account is locked-out, it will remain locked for a minimum of
________________________ or until a system administrator resets the account. -
correct answer 30 minutes
System/session idle time out must be set to_________ minutes or less. - correct
answer 15 minutes
What are the methods to authenticate users? - correct answer - "Something you
know", such as a password or passphrase
- "Something you have", such as a token device or smart card, or
- "Something you are", such as a biometric.
Where passwords or pass-phrases are used, they must be at least _______ characters
long and contain both numeric and alphabetic characters. - correct answer 7
Passwords must be changed at least once every__________________. - correct
answer 90 days
Password history must also be in place to ensure that users' ________ previous
passwords can't be re-used. - correct answer 4
Les avantages d'acheter des résumés chez Stuvia:
Qualité garantie par les avis des clients
Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.
L’achat facile et rapide
Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.
Focus sur l’essentiel
Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.
Foire aux questions
Qu'est-ce que j'obtiens en achetant ce document ?
Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.
Garantie de remboursement : comment ça marche ?
Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.
Auprès de qui est-ce que j'achète ce résumé ?
Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur Academia199. Stuvia facilite les paiements au vendeur.
Est-ce que j'aurai un abonnement?
Non, vous n'achetez ce résumé que pour 12,48 €. Vous n'êtes lié à rien après votre achat.