100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

PCI-DSS ISA Exam Questions with Correct Answers Latest Update

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
08-10-2025
Geschreven in
2025/2026

PCI-DSS ISA Exam Questions with Correct Answers Latest Update Perimeter firewalls installed ______________________________. - Answers between all wireless networks and the CHD environment. Where should firewalls be installed? - Answers At each Internet connection and between any DMZ and the internal network. Review of firewall and router rule sets at least every __________________. - Answers 6 months If disk encryption is used - Answers logical access must be managed separately and independently of native operating system authentication and access control mechanisms Manual clear-text key-management procedures specify processes for the use of the following: - Answers Split knowledge AND Dual control of keys What is considered "Sensitive Authentication Data"? - Answers Card verification value When a PAN is displayed to an employee who does NOT need to see the full PAN, the minimum digits to be masked are: All digits between the ___________ and the __________. - Answers first 6; last 4 Regarding protection of PAN... - Answers PAN must be rendered unreadable during the transmission over public and wireless networks. Under requirement 3.4, what method must be used to render the PAN unreadable? - Answers Hashing the entire PAN using strong cryptography Weak security controls that should NOT be used - Answers WEP, SSL, and TLS 1.0 or earlier Per requirement 5, anti-virus technology must be deployed_________________ - Answers on all system components commonly affected by malicious software. Key functions for anti-vius program per Requirement 5: - Answers 1) Detect 2) Remove 3) Protect Anti-virus solutions may be temporarily disabled only if - Answers there is legitimate technical need, as authorized by management on a case-by-case basis When to install "critical" applicable vendor-supplied security patches? ---> within _________ of release. - Answers 1 month When to install applicable vendor-supplied security patches? - Answers within an appropriate time frame (for example, within three months). When assessing requirement 6.5, testing to verify secure coding techniques are in place to address common coding vulnerabilities includes: - Answers Reviewing software development policies and procedures Requirements 7 restricted access controls by: - Answers Need-to-know and least privilege Inactive accounts over _____________days need to be removed or disabled. - Answers 90 days To verify user access termination policy, an ISA need to select a sample of user terminated in the past _______________ months, and review current user access lists—for both local and remote access—to verify that their IDs have been deactivated or removed from the access lists. - Answers 6 months How many logon attempts should be allowed until resulting temporarily account locked-out? - Answers 6 attempts Once user account is locked-out, it will remain locked for a minimum of ________________________ or until a system administrator resets the account. - Answers 30 minutes System/session idle time out must be set to_________ minutes or less. - Answers 15 minutes What are the methods to authenticate users? - Answers - "Something you know", such as a password or passphrase - "Something you have", such as a token device or smart card, or - "Something you are", such as a biometric.

Meer zien Lees minder
Instelling
PCI DSS ISA
Vak
PCI DSS ISA









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
PCI DSS ISA
Vak
PCI DSS ISA

Documentinformatie

Geüpload op
8 oktober 2025
Aantal pagina's
5
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

PCI-DSS ISA Exam Questions with Correct Answers Latest Update 2025-2026

Perimeter firewalls installed ______________________________. - Answers between all wireless
networks and the CHD environment.

Where should firewalls be installed? - Answers At each Internet connection and between any
DMZ and the internal network.

Review of firewall and router rule sets at least every __________________. - Answers 6 months

If disk encryption is used - Answers logical access must be managed separately and
independently of native operating system authentication and access control mechanisms

Manual clear-text key-management procedures specify processes for the use of the following: -
Answers Split knowledge AND Dual control of keys

What is considered "Sensitive Authentication Data"? - Answers Card verification value

When a PAN is displayed to an employee who does NOT need to see the full PAN, the minimum
digits to be masked are: All digits between the ___________ and the __________. - Answers first 6;
last 4

Regarding protection of PAN... - Answers PAN must be rendered unreadable during the
transmission over public and wireless networks.

Under requirement 3.4, what method must be used to render the PAN unreadable? - Answers
Hashing the entire PAN using strong cryptography

Weak security controls that should NOT be used - Answers WEP, SSL, and TLS 1.0 or earlier

Per requirement 5, anti-virus technology must be deployed_________________ - Answers on all
system components commonly affected by malicious software.

Key functions for anti-vius program per Requirement 5: - Answers 1) Detect

2) Remove

3) Protect

Anti-virus solutions may be temporarily disabled only if - Answers there is legitimate technical
need, as authorized by management on a case-by-case basis

When to install "critical" applicable vendor-supplied security patches? ---> within _________ of
release. - Answers 1 month

When to install applicable vendor-supplied security patches? - Answers within an appropriate
time frame (for example, within three months).

, When assessing requirement 6.5, testing to verify secure coding techniques are in place to
address common coding vulnerabilities includes: - Answers Reviewing software development
policies and procedures

Requirements 7 restricted access controls by: - Answers Need-to-know and least privilege

Inactive accounts over _____________days need to be removed or disabled. - Answers 90 days

To verify user access termination policy, an ISA need to select a sample of user terminated in
the past _______________ months, and review current user access lists—for both local and
remote access—to verify that their IDs have been deactivated or removed from the access lists.
- Answers 6 months

How many logon attempts should be allowed until resulting temporarily account locked-out? -
Answers 6 attempts

Once user account is locked-out, it will remain locked for a minimum of ________________________
or until a system administrator resets the account. - Answers 30 minutes

System/session idle time out must be set to_________ minutes or less. - Answers 15 minutes

What are the methods to authenticate users? - Answers - "Something you know", such as a
password or passphrase

- "Something you have", such as a token device or smart card, or

- "Something you are", such as a biometric.

Where passwords or pass-phrases are used, they must be at least _______ characters long and
contain both numeric and alphabetic characters. - Answers 7

Passwords must be changed at least once every__________________. - Answers 90 days

Password history must also be in place to ensure that users' ________ previous passwords can't
be re-used. - Answers 4

An example of a "one-way" cryptographic function used to render data unreadable is: - Answers
SHA-2

Data from video cameras and/or access control mechanisms is reviewed, and that data is
stored for at least ________________. - Answers 3 months

The visitor logs must contain the relevant information and be retained for at
least_________________. - Answers 3 months

Verify that the storage location security is reviewed at least ____________________ to confirm that
backup media storage is secure. - Answers annually

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
TutorJosh Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
337
Lid sinds
1 jaar
Aantal volgers
16
Documenten
28454
Laatst verkocht
9 uur geleden
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3,6

53 beoordelingen

5
18
4
14
3
12
2
0
1
9

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen