PCI SSC Assessor_New_V4 - Assessor_New_V4 Exam
Which of the following describes "stateful responses' to communication initiated by a trusted network?
According to the glossary, bespoke and custom software describes which type of software?
Which of the following statements is true whenever a cryptographic key is retired and replaced with a new key?
Which of the following meets the definition of 'quarterly' as indicated in the description of timeframes used in PCI DSS requirements?
Which of the following is an example of multi-factor authentication?
An organization has implemented a change-detection mechanism on their systems. How often must critical file comparisons be performed?
Which scenario meets PCI DSS requirements for critical systems to have correct and consistent time?
According to requirement 1, what is the purpose of "Network Security Controls?
What would be an appropriate strength for the key-encrypting key (KEK) used to protect an AES 128-bit data-encrypting key (DEK)
Which statement is true regarding the use of intrusion detection techniques, such as intrusion detection systems and/or intrusion protection systems (IDS'IPS)?