LATEST VERSIONS 50 QUESTIONS AND
CORRECT VERIFIED ANSWERS WITH
RATIONALES (100% CORRECT) A+ GRADED
ASSURED
A (time) ______ process for identifying and securely deleting stored cardholder data that exceeds
defined retention requirements. - CORRECT ANSWER: quarterly
According to PCI DSS requirement 1, Firewall and router rule sets need to be reviewed every
_____ months. - CORRECT ANSWER: 6
At least ______________ and prior to the annual assessment the assessed entity:
- Identifies all locations and flows of cardholder data to verify they are included in the CDE
- Confirms the accuracy of their PCI DSS scope
- Retains their scoping documentation for assessor reference - CORRECT ANSWER: annually
Contains all fields of both Track 1 and Track 2 - CORRECT ANSWER: track 1 (Length up to 79
characters)
DESV User accounts and access privileges are reviewed at least every _________ - CORRECT
ANSWER: six months
Do not store SAD after ____________ (even if encrypted). (track data / cvc / pin) - CORRECT
ANSWER: authorization
, Dual control - CORRECT ANSWER: least two people are required to perform any key-
management operations and no one person has access to the authentication materials (for
example, passwords or keys) of another
Ensure that all system components and software are protected from known vulnerabilities by
installing applicable vendor-supplied security patches. Install critical security patches within
_____ of release. - CORRECT ANSWER: one month
entities monitor its service providers' PCI DSS compliance status at least ________ - CORRECT
ANSWER: annually
Evidence Retention
It is recommended that the ISA secure and maintain digital and/or hard copies of case logs, audit
results and work papers, notes, and any technical information that was created and/or obtained
during the PCI Data Security Assessment for a minimum of ________ or as applicable to
company data retention policies - CORRECT ANSWER: of three (3) years
Examine documented results of scope reviews and interview personnel to verify that the reviews
are performed: - CORRECT ANSWER: At least quarterly
After significant changes to the in-scope environment
For a sample of system components, inspect system configuration settings to verify that
authentication parameters are set to require that user accounts be locked out after not more than
___________ invalid logon attempts. - CORRECT ANSWER: 6
For a sample of system components, inspect system configuration settings to verify that user
password/passphrase parameters are set to require users to change passwords at least once every
______. - CORRECT ANSWER: 90 days
idle time out features have been set to ________ - CORRECT ANSWER: 15 mins or less