PCI SSC Related Exams
QSA_New_V4 Exam
An organization has implemented a change-detection mechanism on their systems. How often must critical file comparisons be performed?
Which statement is true regarding the use of intrusion detection techniques, such as intrusion detection systems and/or intrusion protection systems (IDS/IPS)?
Assigning a unique ID to each person is intended to ensure?