Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following is a requirement for multi-tenant service providers?

A.

Ensure that customers cannot access another entity s cardholder data environment

B.

Provide customers with access to the hosting provider s system configuration files.

C.

Provide customers with a shared user ID for access to critical system binaries

D.

Ensure that a customer's log files are available to all hosted entities

At which step in the payment transaction process does the merchants bank pay the merchant for the purchase and the cardholder s bank bill the cardholder?

A.

Authorization

B.

Clearing

C.

Settlement

D.

Chargeback

In accordance with PCI DSS Requirement 10. how long must audit logs be retained?

A.

At least 1 year, with the most recent 3 months immediately available

B.

At least 2 years, with the most recent 3 months immediately available

C.

At least 2 years with the most recent month immediately available

D.

At least 3 months with the most recent month immediately available

An entity is using custom software in their CDE. The custom software was developed using processes that were assessed by a Secure Software Lifecycle assessor and found to be fully compliant with the Secure SLC standard. What impact will this have on the entity's PCI DSS assessment?

A.

It automatically makes an entity PCI DSS compliant

B.

It may help the entity to meet several requirements in Requirement 6.

C.

There is no impact to the entity

D.

The custom software can be excluded from the PCI DSS assessment

Which of the following statements is true regarding track equivalent data on the chip of a payment card?

A.

It is allowed to be stored by merchants after authorization if encrypted

B.

It is sensitive authentication data

C.

It is out of scope for PCI DSS

D.

It is not applicable for PCI DSS Requirement 3.2

Security policies and operational procedures should be?

A.

Encrypted with strong cryptography

B.

Stored securely so that only management has access

C.

Reviewed and updated at least quarterly

D.

Distributed to and understood by all affected parties

Which of the following is an example of multi-factor authentication?

A.

A token that must be presented twice during the login process

B.

A user passphrase and an application level password.

C.

A user password and a PIN-activated smart card

D.

A user fingerprint and a user thumbprint

Which of the following is required to be included in an incident response plan?

A.

Procedures for notifying PCI SSC of the security incident

B.

Procedures for responding to the detection of unauthorized wireless access points

C.

Procedures for securely deleting incident response records immediately upon resolution of the incident

D.

Procedures for launching a reverse-attack on the individual(s) responsible for the security incident

Could an entity use both the Customized Approach and the Defined Approach to meet the same requirement?

A.

No because a single approach must be selected

B.

No. because only compensating controls can be used with the Defined Approach

C.

Yes if the entity uses no compensating controls

D.

Yes if the entity is eligible to use both approaches

Which scenario meets PCI DSS requirements for restricting access to databases containing cardholder data?

A.

User access to the database is only through programmatic methods

B.

User access to the database is restricted to system and network administrators

C.

Application IDs for database applications can only be used by database administrators

D.

Direct queries to the database are restricted to shared database administrator accounts