PCI-DSS ISA Exam QUESTIONS AND ANSWERS 2022
Perimeter firewalls installed ______________________________. between all wireless networks and the CHD environment. Where should firewalls be installed? At each Internet connection and between any DMZ and the internal network. Review of firewall and router rule sets at least every __________________. 6 months If disk encryption is used logical access must be managed separately and independently of native operating system authentication and access control mechanisms Manual clear-text key-management procedures specify processes for the use of the following: Split knowledge AND Dual control of keys What is considered "Sensitive Authentication Data"? Card verification value When a PAN is displayed to an employee who does NOT need to see the full PAN, the minimum digits to be masked are: All digits between the ___________ and the __________. first 6; last 4 Regarding protection of PAN... PAN must be rendered unreadable during the transmission over public and wireless networks. Under requirement 3.4, what method must be used to render the PAN unreadable? Hashing the entire PAN using strong cryptography Weak security controls that should NOT be used WEP, SSL, and TLS 1.0 or earlier Per requirement 5, anti-virus technology must be deployed_________________ on all system components commonly affected by malicious software. Key functions for anti-vius program per Requirement 5: 1) Detect 2) Remove 3) Protect Anti-virus solutions may be temporarily disabled only if there is legitimate technical need, as authorized by management on a case-by-case basis When to install "critical" applicable vendor-supplied security patches? ---> within _________ of release. 1 month When to install applicable vendor-supplied security patches? within an appropriate time frame (for example, within three months). When assessing requirement 6.5, testing to verify secure coding techniques are in place to address common coding vulnerabilities includes: Reviewing software development policies and procedures Requirements 7 restricted access controls by: Need-to-know and least privilege Inactive accounts over _____________days need to be removed or disabled. 90 days To verify user access termination policy, an ISA need to select a sample of user terminated in the past _______________ months, and review current user access lists—for both local and remote access—to verify that their IDs have been deactivated or removed from the access lists. 6 months How many logon attempts should be allowed until resulting temporarily account locked-out? 6 attempts Once user account is locked-out, it will remain locked for a minimum of ________________________ or until a system administrator resets the account. 30 minutes System/session idle time out must be set to_________ minutes or less. 15 minutes
Written for
- Institution
- PCI-DSS ISA
- Course
- PCI-DSS ISA
Document information
- Uploaded on
- October 13, 2022
- Number of pages
- 5
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
perimeter firewalls installed between all wireless networks and the chd environment
-
where should firewalls be installed at each internet connection and between any dm
Also available in package deal