Which of the following parties is responsible for completion of the Controls Matrix for the Customized Approach?
Which scenario meets PCI DSS requirements for critical systems to have correct and consistent time?
Which of the following describes "stateful responses' to communication initiated by a trusted network?
A network firewall has been configured with the latest vendor security patches What additional configuration is needed to harden the firewall?
An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA. while also ensuing that the customized control is implemented securely. Which of the following statements is true?
An LDAP server providing authentication services to the cardholder data environment is
Which of the following statements is true regarding track equivalent data on the chip of a payment card?
Where an entity under assessment is using the customized approach, which of the following steps is the responsibility of the assessor?
If disk encryption is used to protect account data what requirement should be met for the disk encryption solution?
Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?
Which of the following is required to be included in an incident response plan?