New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

A network firewall has been configured with the latest vendor security patches. What additional configuration Is needed to harden the firewall?

A.

Remove the default "Firewall Administrator account and create a shared account for firewall administrators to use.

B.

Configure the firewall to permit all traffic until additional rules are defined.

C.

Synchronize the firewall rules with the other firewalls in the environment.

D.

Disable any firewall functions that are not needed in production.

Full Access
Question # 5

Which of the following file types must be monitored by a change-detection mechanism (for example, a file-integrity monitoring tool)?

A.

Application vendor manuals

B.

Files that regularly change

C.

Security policy and procedure documents

D.

System configuration and parameter files

Full Access
Question # 6

Which of the following statements Is true whenever a cryptographic key Is retired and replaced with a new key?

A.

The retired key must not be used for encryption operations.

B.

Cryptographic key components from the retired key must be retained for 3 months before disposal.

C.

Anew key custodian must be assigned.

D.

All data encrypted under the retired key must be securely destroyed.

Full Access
Question # 7

Which of the following is true regarding compensating controls?

A.

A compensating control is not necessary if all other PCI DSS requirements are in place.

B.

A compensating control must address the risk associated with not adhering to the PCI DSS requirement.

C.

An existing PCI DSS requirement can be used as compensating control if it is already implemented.

D.

A compensating control worksheet is not required if the acquirer approves the compensating control.

Full Access
Question # 8

Which of the following statements Is true whenever a cryptographic key Is retired and replaced with a new key?

A.

The retired key must not be used for encryption operations.

B.

Cryptographic key components from the retired key must be retained for 3 months before disposal.

C.

Anew key custodian must be assigned.

D.

All data encrypted under the retired key must be securely destroyed.

Full Access
Question # 9

Which statement about PAN is true?

A.

It must be protected with strong cryptography for transmission over private wireless networks.

B.

It must be protected with strong cryptography tor transmission over private wired networks.

C.

It does not require protection for transmission over public wireless networks.

D.

It does not require protection for transmission over public wired networks.

Full Access
Question # 10

What should the assessor verify when testing that cardholder data Is protected whenever It Is sent over open public networks?

A.

The security protocol Is configured to accept all digital certificates.

B.

A proprietary security protocol is used.

C.

The security protocol accepts only trusted keys.

D.

The security protocol accepts connections from systems with lower encryption strength than required by the protocol.

Full Access
Question # 11

At which step in the payment transaction process does the merchant's bank pay the merchant for the purchase, and the cardholder's bank bill the cardholder?

A.

Authorization

B.

Clearing

C.

Settlement

D.

Chargeback

Full Access
Question # 12

Which of the following is true regarding internal vulnerability scans?

A.

They must be performed after a significant change.

B.

They must be performed by an Approved Scanning Vendor (ASV).

C.

They must be performed by QSA personnel.

D.

They must be performed at least annually.

Full Access