Which systems must have anti-malware solutions?
Assigning a unique ID to each person is intended to ensure?
Which statement about PAN is true?
PCI DSS Requirement 12.7 requires screening and background checks for which of the following?
Which of the following statements is true regarding track equivalent data on the chip of a payment card?
Which of the following meets the definition of “quarterly” as indicated in the description of timeframes used in PCI DSS requirements?
Which of the following file types must be monitored by a change-detection mechanism (for example, a file-integrity monitoring tool)?
Which statement is true regarding the presence of both hashed and truncated versions of the same PAN in an environment?
A network firewall has been configured with the latest vendor security patches. What additional configuration Is needed to harden the firewall?
Which of the following is required to be included in an incident response plan?
Which statement about the Attestation of Compliance (AOC) is correct?
Which scenario meets PCI DSS requirements for restricting access to databases containing cardholder data?
Viewing of audit log files should be limited to?
An entity wants to know if the Software Security Framework can be leveraged during their assessment. Which of the following software types would this apply to?
Which systems must have anti-malware solutions?
Where can live PANs be used for testing?
Which of the following describes the intent of installing one primary function per server?
Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?
An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA, while also ensuring that the customized control is implemented securely. Which of the following statements is true?
Which of the following is true regarding internal vulnerability scans?
Could an entity use both the Customized Approach and the Defined Approach to meet the same requirement?
Which of the following parties is responsible for completion of the Controls Matrix for the Customized Approach?