



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Perimeter firewalls installed ______________________________. - ✔✔between all wireless networks and the CHD environment. Where should firewalls be installed? - ✔✔At each Internet connection and between any DMZ and the internal network. Review of firewall and router rule sets at least every __________________. - ✔✔6 months If disk encryption is used - ✔✔logical access must be managed separately and independently of native operating system authentication and access control mechanisms Manual clear-text key-management procedures specify processes for the use of the following: - ✔✔Split knowledge AND Dual control of keys
Typology: Exams
1 / 6
This page cannot be seen from the preview
Don't miss anything!
Perimeter firewalls installed ______________________________. - ✔✔between all wireless networks and the CHD environment. Where should firewalls be installed? - ✔✔At each Internet connection and between any DMZ and the internal network. Review of firewall and router rule sets at least every __________________. - ✔✔6 months If disk encryption is used - ✔✔logical access must be managed separately and independently of native operating system authentication and access control mechanisms Manual clear-text key-management procedures specify processes for the use of the following: - ✔✔Split knowledge AND Dual control of keys What is considered "Sensitive Authentication Data"? - ✔✔Card verification value When a PAN is displayed to an employee who does NOT need to see the full PAN, the minimum digits to be masked are: All digits between the ___________ and the __________. - ✔✔first 6; last 4 Regarding protection of PAN... - ✔✔PAN must be rendered unreadable during the transmission over public and wireless networks. Under requirement 3.4, what method must be used to render the PAN unreadable? - ✔✔Hashing the entire PAN using strong cryptography Weak security controls that should NOT be used - ✔✔WEP, SSL, and TLS 1.0 or earlier
Per requirement 5, anti-virus technology must be deployed_________________ - ✔✔on all system components commonly affected by malicious software. Key functions for anti-vius program per Requirement 5: - ✔✔1) Detect
Using time-synchronization technology, synchronize all critical system clocks and times and ensure that the following is implemented for: - ✔✔acquiring, distributing, and storing time All security events and logs of (a) all system components that store, process, or transmit CHD; (b) critical system components; (c) components that perform security functions (for example, firewalls, intrusion- detection systems/intrusion-prevention systems (IDS/IPS), authentication servers, e-commerce redirection servers, etc.) to be reviewed at least ______________. - ✔✔daily Audit logs must be immediately available for analysis for a period of ________ and must be retained for a period of _________. - ✔✔3 months; 1 year Detection and identification of authorized and unauthorized wireless access points must occur _________________. - ✔✔quarterly Run internal and external network vulnerability scans at least ____________________ and after any significant change in the network - ✔✔quarterly External vulnerability scans must be run by ____________ and perform ________________. - ✔✔an ASV; quarterly For external scans, no vulnerabilities exist that are scored _____________ by the CVSS. - ✔✔4.0 or higher Penetration testing for "Service Provider" in which targeting segmentation controls must be perform every __________________. - ✔✔6 months FIM tools must be configured to perform critical file comparisons check at least_______________, - ✔✔weekly A retail location that does not use wireless devices in store must test for the presence of unauthorized wireless devices every ________________. - ✔✔quarter
Verify that personnel attend security awareness training upon hire and at least___________________. - ✔✔annually Appendix A1 applies to - ✔✔hosting providers Appendix A2 applies to - ✔✔entities using SSL/Early TLS Appendix A3 applies to - ✔✔Designated Entities Supplemental Validation (DESV) An entity is required to undergo an assessment according to this Appendix ONLY if instructed to do so by an acquirer or a payment brand. Designated entities (DESV) must document and confirm the accuracy of PCI DSS scope at least_________ and upon significant changes to the in-scope environment. - ✔✔quarterly Designated Entities (DESV) must ensure that pen tests are performed on "segmentation controls" every _________________, and after significant changes. - ✔✔6 months In regards to DESV, user accounts and access privileges are reviewed at least every______________. - ✔✔6 months ASV scans must cover__________________________________. - ✔✔ALL Internet-Facing IP addresses in existence at the entity. Compensating controls need to be evaluated at least_________________. - ✔✔annually Compensating controls requirement 1: - ✔✔Constrains Compensating controls requirement 2: - ✔✔Objective