(Latest 2026)
Perimeter firewalls installed ______________________________. -
Correct Answers ✅between all wireless networks and the
CHD environment.
Where should firewalls be installed? - Correct Answers ✅At
each Internet connection and between any DMZ and the
internal network.
Review of firewall and router rule sets at least every
__________________. - Correct Answers ✅6 months
If disk encryption is used - Correct Answers ✅logical
access must be managed separately and independently of
native operating system authentication and access control
mechanisms
Manual clear-text key-management procedures specify
processes for the use of the following: - Correct Answers
✅Split knowledge AND Dual control of keys
What is considered "Sensitive Authentication Data"? -
Correct Answers ✅Card verification value
When a PAN is displayed to an employee who does NOT need
to see the full PAN, the minimum digits to be masked are: All
digits between the ___________ and the __________. - Correct
Answers ✅first 6; last 4
, PCI-DSS ISA Exam Answered Questions
(Latest 2026)
Regarding protection of PAN... - Correct Answers ✅PAN
must be rendered unreadable during the transmission over
public and wireless networks.
Under requirement 3.4, what method must be used to render
the PAN unreadable? - Correct Answers ✅Hashing the
entire PAN using strong cryptography
Weak security controls that should NOT be used - Correct
Answers ✅WEP, SSL, and TLS 1.0 or earlier
Per requirement 5, anti-virus technology must be
deployed_________________ - Correct Answers ✅on all
system components commonly affected by malicious
software.
Key functions for anti-vius program per Requirement 5: -
Correct Answers ✅1) Detect
2) Remove
3) Protect
Anti-virus solutions may be temporarily disabled only if -
Correct Answers ✅there is legitimate technical need, as
authorized by management on a case-by-case basis