100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

PCI-DSS Medium Test Questions With Verified And Correct Answers

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
05-06-2025
Written in
2024/2025

Review logs and security events for all system components to identify anomalies or suspicious activity. - Correct Answer 10.6 Retain audit trail history for at least one year, with a minimum of three months immediately available for analysis (for example, online, archived, or restorable from backup). - Correct Answer 10.7 Ensure that security policies and operational procedures for monitoring all access to network resources and cardholder data are documented, in use, and known to all affected parties. - Correct Answer 10.8 Implement processes to test for the presence of wireless access points (802.11), and detect and identify all authorized and unauthorized wireless access points on a quarterly basis. - Correct Answer 11.1

Show more Read less
Institution
PCI-DSS
Course
PCI-DSS










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
PCI-DSS
Course
PCI-DSS

Document information

Uploaded on
June 5, 2025
Number of pages
18
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

PCI-DSS Medium Test Questions

Review logs and security events for all system components to identify

anomalies or suspicious activity. - Correct Answer ✔ ✔ 10.6


Retain audit trail history for at least one year, with a minimum of

three months immediately available for analysis (for example, online,

archived, or restorable from backup). - Correct Answer ✔ ✔ 10.7


Ensure that security policies and operational procedures for

monitoring all access to network resources and cardholder data are

documented, in use, and known to all affected parties. - Correct

Answer ✔ ✔ 10.8


Implement processes to test for the presence of wireless access points

(802.11), and detect and identify all authorized and unauthorized

wireless access points on a quarterly basis. - Correct Answer ✔ ✔

11.1

,Run internal and external network vulnerability scans at least

quarterly and after any significant change in the network (such as new

system component installations, changes in network topology,

firewall rule modifications, product upgrades). - Correct Answer ✔

✔ 11.2


Implement a methodology for penetration testing. - Correct Answer

✔ ✔ 11.3


Use intrusion-detection and/or intrusion-prevention techniques to

detect and/or prevent intrusions into the network. Monitor all traffic

at the perimeter of the cardholder data environment as well as at

critical points in the cardholder data environment, and alert

personnel to suspected compromises. - Correct Answer ✔ ✔ 11.4


Deploy a change-detection mechanism (for example, file-integrity

monitoring tools) to alert personnel to unauthorized modification

(including changes, additions, and deletions) of critical system files,

configuration files, or content files; and configure the software to

, perform critical file comparisons at least weekly. - Correct Answer

✔ ✔ 11.5


Ensure that security policies and operational procedures for security

monitoring and testing are documented, in use, and known to all

affected parties. - Correct Answer ✔ ✔ 11.6


Establish, publish, maintain, and disseminate a security policy. -

Correct Answer ✔ ✔ 12.1


Implement a risk-assessment process - Correct Answer ✔ ✔ 12.2


Develop usage policies for critical technologies and define proper use

of these technologies. - Correct Answer ✔ ✔ 12.3


Ensure that the security policy and procedures clearly define

information security responsibilities for all personnel. - Correct

Answer ✔ ✔ 12.4


Assign to an individual or team information security management

responsibilities. - Correct Answer ✔ ✔ 12.5

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
jackline98 Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
259
Member since
2 year
Number of followers
152
Documents
9862
Last sold
1 month ago

Here you will find different past papers with correct and updated solutions .Please do not forget to leave a review after purchasing any document .Goodluck and success in advance.

3.3

60 reviews

5
20
4
11
3
9
2
5
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions