최신 PCIP3.0 무료덤프 - PCI Payment Card Industry Professional
Information Security Policies must be reviewed/updated _____________ to meet requirement 12.1.1
정답: B
PCI DSS Requirement 5 states that anti-virus software must be:
정답: C
The Information Supplements: (Select ALL that apply)
정답: A,B,D
Protect all systems against malware and regularly updated anti-virus software or programs is the
____________
____________
정답: D
Information Supplements provided by the PCI SSC "supersede" or replace PCI DSS requirements
정답: B
Requirement 3.5 requires document and implement procedures to protect keys used to secure stored cardholder data against disclose and misuse. This requirement applies to keys used to encrypt stored cardholder data, and also applies to key-encrypting keys used to protect data-encrypting keys. Such key-encrypting keys must be
정답: D
Track and monitor all access to network resources and cardholder data is the ___________
정답: C
The use of Tokenization can eliminate the need for PCI Compliance
정답: B
Risk assessments must be implemented in order to meet requirement 12.2. Please select all risk assessments methodologies that can be used in order to meet this requirement.
정답: A,B,D