Which of the following parties is responsible for completion of the Controls Matrix for the Customized Approach?
Which of the following is true regarding compensating controls?
Which of the following file types must be monitored by a change-detection mechanism (e.g., a file-integrity monitoring tool)?
According to Requirement 1, what is the purpose of “Network Security Controls"?
If an entity shares cardholder data with a TPSP, what activity is the entity required to perform?
What process is required by PCI DSS for protecting card-reading devices at the point-of-sale?
Which of the following is required to be included in an incident response plan?
Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?
An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA, while also ensuring that the customized control is implemented securely. Which of the following statements is true?
An organization wishes to implement multi-factor authentication for remote access, using the user's individual password and a digital certificate. Which of the following scenarios would meet PCI DSS requirements for multi-factor authentication?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
PCI SSC Free Exams |
---|
![]() |