In accordance with PCI DSS Requirement 10. how long must audit logs be retained?
If disk encryption is used to protect account data what requirement should be met for the disk encryption solution?
Which of the following statements is true regarding track equivalent data on the chip of a payment card?
Assigning a unique ID to each person is intended to ensure?
What must the assessor verify when testing that PAN is protected whenever it is sent over the Internet?
What must be included m an organization’s procedures for managing visitors?
What do PCI DSS requirements for protecting cryptographic keys include?
Which of the following describes "stateful responses' to communication initiated by a trusted network?
An entity accepts e-commerce payment card transactions and stores account data in a database The database server and the web server are both accessible from the Internet The database server and the web server are on separate physical servers. What is required for the entity to meet PCI DSS requirements7
An entity wants to know if the Software Security Framework can be leveraged during their assessment Which of the following software types would this apply to?
According to requirement 1, what is the purpose of "Network Security Controls?
Security policies and operational procedures should be?
The intent of assigning a risk ranking to vulnerabilities is to?
According to the glossary, bespoke and custom software describes which type of software?
Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?
Which of the following can be sampled for testing during a PCI DSS assessment?
A sample of business facilities is reviewed during the PCI DSS assessment What is the assessor required to validate about the sample?
Which of the following is a requirement for multi-tenant service providers?