A "Partial Assessment is a new assessment result What is a ‘Partial Assessment’?
Options:
A.
A ROC that has been completed after using an SAQ to determine which requirements should be tested. As per FAQ 1331. (As long as the entity meets the SAQs eligibility criteria)
B.
An interim result before the final ROC has been completed
C.
A term used by payment brands and acquirers to describe entities that have multiple payment channels with each channel having its own assessment
D.
An assessment with at least one requirement marked as Not Tested”
According to requirement 3.1.2, an assessment with at least one requirement marked as Not Tested is considered a partial assessment, which means it does not meet all the requirements and controls defined in Appendix E of the PCI DSS v3.2.1 Quick Reference Guide1. This is one of the requirements for ensuring that assessments are conducted in accordance with PCI DSS.
Question 2
What is the intent of classifying media that contains cardholder data?
Options:
A.
Ensuring that media is property protected according to the sensitivity of the data it contains
B.
Ensuring that media containing cardholder data is moved from secured areas an a quarterly basis
C.
Ensuring that media is clearly and visibly labeled as 'Confidential so all personnel know that the media contains cardholder data
D.
Ensuring that all media is consistently destroyed on the same schedule regardless of the contents
Answer:
A
Explanation:
Explanation:
classifying media that contains cardholder data is intended to ensure that media is property protected according to the sensitivity of the data it contains, which means it should be markedwith labels or tags that indicate its level of confidentiality or integrity. This is one of the requirements for ensuring that media containing cardholder data is properly labeled.
Question 3
Which of the following describes "stateful responses' to communication initiated by a trusted network?
Options:
A.
Administrative access to respond to requests to change the firewall is limited to one individual at a time
B.
Active network connections are tracked so that invalid response' traffic can be identified.
C.
A current baseline of application configurations is maintained and any mis-configuration is responded to promptly
D.
Logs of user activity on the firewall are correlated to identify and respond to suspicious behavior
Answer:
B
Explanation:
Explanation:
According to the PCI DSS v3.2.1 Quick Reference Guide1, active network connections are tracked so that invalid response traffic can be identified. This is one of the requirements for preventing replay attacks and ensuring secure communication.