______________________________.
Where should firewalls be installed? At each Internet connection and between any DMZ and the internal netw
Review of firewall and router rule sets 6 months
at least every __________________.
logical access must be managed separately and independently of native
If disk encryption is used
operating system authentication and access control mechanisms
Manual clear-text key-management Split knowledge AND Dual control of keys
procedures specify processes for the
use of the following:
What is considered "Sensitive Card verification value
Authentication Data"?
When a PAN is displayed to an first 6; last 4
employee who does NOT need to see
the full PAN, the minimum digits to be
masked are: All digits between the
___________ and the __________.
, PAN must be rendered unreadable during the transmission over public a
Regarding protection of PAN...
wireless networks.
Under requirement 3.4, what method Hashing the entire PAN using strong cryptography
must be used to render the PAN
unreadable?
Weak security controls that should NOT WEP, SSL, and TLS 1.0 or earlier
be used
Per requirement 5, anti-virus on all system components commonly affected by malicious software.
technology must be
deployed_________________
1) Detect
Key functions for anti-vius program per
2) Remove
Requirement 5:
3) Protect
Anti-virus solutions may be temporarily there is legitimate technical need, as authorized by management on a ca
disabled only if by-case basis
When to install "critical" applicable 1 month
vendor-supplied security patches? --->
within _________ of release.