Q: 1
Which scenario meets PCI DSS requirements for restricting access to databases containing cardholder
data?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
Which of the following is true regarding internal vulnerability scans?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
What does the PCI PTS standard cover?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
In accordance with PCI DSS Requirement 10, how long must audit logs be retained?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
Which statement is true regarding the use of intrusion detection techniques, such as intrusion
detection systems and/or Intrusion protection systems (IDS/IPS)?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
Viewing of audit log files should be limited to?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
Where can live PANs be used for testing?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
An organization wishes to implement multi-factor authentication for remote access, using the user's
Individual password and a digital certificate. Which of the following scenarios would meet PCI DSS
requirements for multi-factor authentication?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes
of reducing PCI DSS scope?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2