Could an entity use both the Customized Approach and the Defined Approach to meet the same requirement?
Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?
What does the PCI PTS standard cover?
Which of the following file types must be monitored by a change-detection mechanism (e.g., a file-integrity monitoring tool)?
In the ROC Reporting Template, which of the following Is the best approach for a response where the requirement was "In Place’?
Where an entity under assessment is using the customized approach, which of the following steps is the responsibility of the assessor?
The intent of assigning a risk ranking to vulnerabilities is to?
A retail merchant has a server room containing systems that store encrypted PAN data. The merchant has implemented a badge access-control system that identifies who entered and exited the room, on what date, and at what time. There are no video cameras located in the server room. Based on this information, which statement is true regarding PCI DSS physical security requirements?
A sample of business facilities is reviewed during the PCI DSS assessment. What is the assessor required to validate about the sample?
At which step in the payment transaction process does the merchant's bank pay the merchant for the purchase, and the cardholder's bank bill the cardholder?