An entity wants to know if the Software Security Framework can be leveraged during their assessment. Which of the following software types would this apply to?
What should the assessor verify when testing that cardholder data Is protected whenever It Is sent over open public networks?
What must the assessor verify when testing that PAN is protected whenever it is sent over the Internet?
Which statement is true regarding the use of intrusion detection techniques, such as intrusion detection systems and/or intrusion protection systems (IDS/IPS)?
If disk encryption is used to protect account data, what requirement should be met for the disk encryption solution?
An entity accepts e-commerce payment card transactions and stores account data in a database. The database server and the web server are both accessible from the Internet. The database server and the web server are on separate physical servers. What is required for the entity to meet PCI DSS requirements?
Which of the following parties is responsible for completion of the Controls Matrix for the Customized Approach?
Which of the following file types must be monitored by a change-detection mechanism (for example, a file-integrity monitoring tool)?
A "Partial Assessment" is a new assessment result. What is a “Partial Assessment"?
A sample of business facilities is reviewed during the PCI DSS assessment. What is the assessor required to validate about the sample?
In the ROC Reporting Template, which of the following Is the best approach for a response where the requirement was "In Place’?
According to Requirement 1, what is the purpose of “Network Security Controls"?
Which of the following statements is true whenever a cryptographic key is retired and replaced with a new key?
If an entity shares cardholder data with a TPSP, what activity is the entity required to perform?
Which of the following describes "stateful responses" to communication Initiated by a trusted network?
According to the glossary, "bespoke and custom software” describes which type of software?