PCI-DSS ISA Exam
Perimeter firewalls installed ______________________________. - correct answer
between all wireless networks and the CHD environment.
Where should firewalls be installed? - correct answer At each Internet connection and
between any DMZ and the internal network.
Review of firewall and router rule sets at least every __________________. - correct
answer 6 months
If disk encryption is used - correct answer logical access must be managed separately
and independently of native operating system authentication and access control
mechanisms
Manual clear-text key-management procedures specify processes for the use of the
following: - correct answer Split knowledge AND Dual control of keys
What is considered "Sensitive Authentication Data"? - correct answer Card verification
value
When a PAN is displayed to an employee who does NOT need to see the full PAN, the
minimum digits to be masked are: All digits between the ___________ and the
__________. - correct answer first 6; last 4
Regarding protection of PAN... - correct answer PAN must be rendered unreadable
during the transmission over public and wireless networks.
Under requirement 3.4, what method must be used to render the PAN unreadable? -
correct answer Hashing the entire PAN using strong cryptography
Weak security controls that should NOT be used - correct answer WEP, SSL, and
TLS 1.0 or earlier
Per requirement 5, anti-virus technology must be deployed_________________ -
correct answer on all system components commonly affected by malicious software.
Key functions for anti-vius program per Requirement 5: - correct answer 1) Detect
2) Remove
3) Protect
Anti-virus solutions may be temporarily disabled only if - correct answer there is
legitimate technical need, as authorized by management on a case-by-case basis
, When to install "critical" applicable vendor-supplied security patches? ---> within
_________ of release. - correct answer 1 month
When to install applicable vendor-supplied security patches? - correct answer within
an appropriate time frame (for example, within three months).
When assessing requirement 6.5, testing to verify secure coding techniques are in place
to address common coding vulnerabilities includes: - correct answer Reviewing
software development policies and procedures
Requirements 7 restricted access controls by: - correct answer Need-to-know and
least privilege
Inactive accounts over _____________days need to be removed or disabled. - correct
answer 90 days
To verify user access termination policy, an ISA need to select a sample of user
terminated in the past _______________ months, and review current user access lists
—for both local and remote access—to verify that their IDs have been deactivated or
removed from the access lists. - correct answer 6 months
How many logon attempts should be allowed until resulting temporarily account locked-
out? - correct answer 6 attempts
Once user account is locked-out, it will remain locked for a minimum of
________________________ or until a system administrator resets the account. -
correct answer 30 minutes
System/session idle time out must be set to_________ minutes or less. - correct
answer 15 minutes
What are the methods to authenticate users? - correct answer - "Something you
know", such as a password or passphrase
- "Something you have", such as a token device or smart card, or
- "Something you are", such as a biometric.
Where passwords or pass-phrases are used, they must be at least _______ characters
long and contain both numeric and alphabetic characters. - correct answer 7
Passwords must be changed at least once every__________________. - correct
answer 90 days
Password history must also be in place to ensure that users' ________ previous
passwords can't be re-used. - correct answer 4
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Academia199. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.