Pass the PCI SSC PCI Qualified Professionals ISA-N_Retake Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

If disk encryption is used to protect account data what requirement should be met for the disk encryption solution?

Options:

A.

Access to the disk encryption must be managed independently of the operating system access control mechanisms


B.

The disk encryption system must use the same user account authenticator as the operating system


C.

The decryption keys must be associated with the local user account database


D.

The decryption keys must be stored within the local user account database


Expert Solution
Questions # 12:

Which of the following is an example of multi-factor authentication?

Options:

A.

A token that must be presented twice during the login process


B.

A user passphrase and an application level password.


C.

A user password and a PIN-activated smart card


D.

A user fingerprint and a user thumbprint


Expert Solution
Questions # 13:

Which of the following is a requirement for multi-tenant service providers?

Options:

A.

Ensure that customers cannot access another entity s cardholder data environment


B.

Provide customers with access to the hosting provider s system configuration files.


C.

Provide customers with a shared user ID for access to critical system binaries


D.

Ensure that a customer's log files are available to all hosted entities


Expert Solution
Questions # 14:

What does the PCI PTS standard cover?

Options:

A.

Point-of-interaction devices used to protect account data


B.

Secure coding practices for commercial payment applications.


C.

Development of strong cryptographic algorithms


D.

End-to-end encryption solutions for transmission of account data


Expert Solution
Questions # 15:

Which statement about PAN is true?

Options:

A.

It must be protected with strong cryptography for transmission over private wireless networks


B.

It must be protected with strong cryptography (or transmission over private wired networks


C.

It does not require protection for transmission over public wireless networks


D.

It does not require protection for transmission over public wired networks


Expert Solution
Questions # 16:

Which statement is true regarding the PCI DSS Report on Compliance (ROC)?

Options:

A.

The ROC Reporting Template and instructions provided by PCI SSC should be used for all ROCs.


B.

The assessor may use either their own template or the ROC Reporting Template provided by PCI SSC


C.

The assessor must create their own ROC template for each assessment report


D.

The ROC Reporting Template provided by PCI SSC is only required for service provider assessments


Expert Solution
Questions # 17:

An organization has implemented a change-detection mechanism on their systems. How often must critical file comparisons be performed?

Options:

A.

At least weekly


B.

Periodically as defined by the entity


C.

Only after a valid change is installed


D.

At least monthly


Expert Solution
Questions # 18:

Which of the following statements is true whenever a cryptographic key is retired and replaced with a new key?

Options:

A.

The retired key must not be used for encryption operations


B.

Cryptographic key components from the retired key must be retained for 3 months before disposal


C.

A new key custodian must be assigned


D.

All data encrypted under the retired key must be securely destroyed


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions