An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA, while also ensuring that the customized control is implemented securely. Which of the following statements is true?
A retail merchant has a server room containing systems that store encrypted PAN data. The merchant has Implemented a badge access-control system that Identifies who entered and exited the room, on what date, and at what time. There are no video cameras located in the server room.Based on this information, which statement is true regarding PCI DSS physical security requirements?
Which of the following statements Is true whenever a cryptographic key Is retired and replaced with a new key?
What must be included in an organization's procedures for managing visitors?
Which systems must have anti-malware solutions?
Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?
Which of the following is true regarding compensating controls?
Which of the following describes "stateful responses" to communication Initiated by a trusted network?
Where can live PANs be used for testing?
What does the PCI PTS standard cover?
The Intent of assigning a risk ranking to vulnerabilities Is to?
An organization wishes to implement multi-factor authentication for remote access, using the user's Individual password and a digital certificate. Which of the following scenarios would meet PCI DSS requirements for multi-factor authentication?