8/24/24, 6:05
PM
DANIEL
PCI-DSS ISA Exam
Practice questions for this
set Terms in this set (62)
Perimeter firewalls installed between all wireless networks and the CHD environment.
.
Where should firewalls be installed? At each Internet connection and between any DMZ and the internal network.
Review of firewall and router rule sets at 6 months
least every _.
logical access must be managed separately and independently of native operating
If disk encryption is used
system authentication and access control mechanisms
Manual clear-text key-management Split knowledge AND Dual control of keys
procedures specify processes for the use of
the following:
What is considered "Sensitive Authentication Card verification value
Data"?
When a PAN is displayed to an first 6; last 4
employee who does NOT need to see the
full PAN, the minimum digits to be masked
are: All digits between the and the _.
PAN must be rendered unreadable during the transmission over public and wireless
Regarding protection of PAN...
networks.
Under requirement 3.4, what method must Hashing the entire PAN using strong cryptography
be used to render the PAN unreadable?
Weak security controls that should NOT be WEP, SSL, and TLS 1.0 or earlier
used
Per requirement 5, anti-virus technology on all system components commonly affected by malicious software.
must be deployed
1) Detect
Key functions for anti-vius program per
2)Remove
Requirement 5:
3) Protect
Anti-virus solutions may be temporarily there is legitimate technical need, as authorized by management on a case-by-case
disabled only if basis
When to install "critical" applicable 1 month
vendor- supplied security patches? --->
within
of release.
When to install applicable vendor-supplied within an appropriate time frame (for example, within three months).
security patches?
1/
4
PM
DANIEL
PCI-DSS ISA Exam
Practice questions for this
set Terms in this set (62)
Perimeter firewalls installed between all wireless networks and the CHD environment.
.
Where should firewalls be installed? At each Internet connection and between any DMZ and the internal network.
Review of firewall and router rule sets at 6 months
least every _.
logical access must be managed separately and independently of native operating
If disk encryption is used
system authentication and access control mechanisms
Manual clear-text key-management Split knowledge AND Dual control of keys
procedures specify processes for the use of
the following:
What is considered "Sensitive Authentication Card verification value
Data"?
When a PAN is displayed to an first 6; last 4
employee who does NOT need to see the
full PAN, the minimum digits to be masked
are: All digits between the and the _.
PAN must be rendered unreadable during the transmission over public and wireless
Regarding protection of PAN...
networks.
Under requirement 3.4, what method must Hashing the entire PAN using strong cryptography
be used to render the PAN unreadable?
Weak security controls that should NOT be WEP, SSL, and TLS 1.0 or earlier
used
Per requirement 5, anti-virus technology on all system components commonly affected by malicious software.
must be deployed
1) Detect
Key functions for anti-vius program per
2)Remove
Requirement 5:
3) Protect
Anti-virus solutions may be temporarily there is legitimate technical need, as authorized by management on a case-by-case
disabled only if basis
When to install "critical" applicable 1 month
vendor- supplied security patches? --->
within
of release.
When to install applicable vendor-supplied within an appropriate time frame (for example, within three months).
security patches?
1/
4