Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Could an entity use both the Customized Approach and the Defined Approach to meet the same requirement?

A.

No, because a single approach must be selected.

B.

No, because only compensating controls can be used with the Defined Approach.

C.

Yes, if the entity uses no compensating controls.

D.

Yes, if the entity is eligible to use both approaches.

Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?

A.

Routers that monitor network traffic flows between the CDE and out-of-scope networks.

B.

Firewalls that log all network traffic flows between the CDE and out-of-scope networks.

C.

Virtual LANs that route network traffic between the CDE and out-of-scope networks.

D.

A network configuration that prevents all network traffic between the CDE and out-of-scope networks.

What does the PCI PTS standard cover?

A.

Point-of-Interaction devices used to protect account data.

B.

Secure coding practices for commercial payment applications.

C.

Development of strong cryptographic algorithms.

D.

End-lo-end encryption solutions for transmission of account data.

Which of the following file types must be monitored by a change-detection mechanism (e.g., a file-integrity monitoring tool)?

A.

Application vendor manuals

B.

Files that regularly change

C.

Security policy and procedure documents

D.

System configuration and parameter files

In the ROC Reporting Template, which of the following Is the best approach for a response where the requirement was "In Place’?

A.

Details of the entity's project plan for implementing the requirement.

B.

Details of how the assessor observed the entity's systems were compliant with the requirement.

C.

Details of the entity's reason for not implementing the requirement

D.

Details of how the assessor observed the entity's systems were not compliant with the requirement

Where an entity under assessment is using the customized approach, which of the following steps is the responsibility of the assessor?

A.

Monitor the control.

B.

Derive testing procedures and document them in Appendix E of the ROC.

C.

Document and maintain evidence about each customized control as defined in Appendix E of PCI DSS.

D.

Perform the targeted risk analysis as per PCI DSS requirement 12.3.2.

The intent of assigning a risk ranking to vulnerabilities is to?

A.

Ensure all vulnerabilities are addressed within 30 days.

B.

Replace the need for quarterly ASV scans.

C.

Prioritize the highest risk items so they can be addressed more quickly.

D.

Ensure that critical security patches are installed at least quarterly.

A retail merchant has a server room containing systems that store encrypted PAN data. The merchant has implemented a badge access-control system that identifies who entered and exited the room, on what date, and at what time. There are no video cameras located in the server room. Based on this information, which statement is true regarding PCI DSS physical security requirements?

A.

The badge access-control system must be protected from tampering or disabling.

B.

The merchant must install video cameras in addition to the existing access-control system.

C.

Data from the access-control system must be securely deleted on a monthly basis.

D.

The merchant must install motion-sensing alarms in addition to the existing access-control system.

A sample of business facilities is reviewed during the PCI DSS assessment. What is the assessor required to validate about the sample?

A.

It includes a consistent set of facilities that are reviewed for all assessments.

B.

The number of facilities in the sample is at least 10 percent of the total number of facilities.

C.

Every facility where cardholder data is stored is reviewed.

D.

All types and locations of facilities are represented.

At which step in the payment transaction process does the merchant's bank pay the merchant for the purchase, and the cardholder's bank bill the cardholder?

A.

Authorization

B.

Clearing

C.

Settlement

D.

Chargeback