<< Prev Question Next Question >>

Question 11/27

An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA During the assessment, you spend time completing the Controls Matrix and the TRA. while also ensuing that the customized control is implemented securely Which of the following statements is true?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (27q)
Question 1: Which of the following types of events is required to be log...
Question 2: Passwords for default accounts and default administrative ac...
Question 3: In accordance with PCI DSS Requirement 10. how long must aud...
Question 4: What is the intent of classifying media that contains cardho...
Question 5: Which of the following describes the intent of installing on...
Question 6: Which of the following is true regarding internal vulnerabil...
Question 7: Which statement is true regarding the use of intrusion detec...
Question 8: An internal NTP server that provides lime services to the Ca...
Question 9: An organization wishes to implement multi-factor authenticat...
Question 10: Which statement about the Attestation of Compliance (AOC) is...
Question 11: An entity wants to use the Customized Approach. They are uns...
Question 12: Which of the following describes "stateful responses' to com...
Question 13: In the ROC Repotting Template, which of the following is the...
Question 14: What must be included m an organization's procedures for man...
Question 15: A sample of business facilities is reviewed during the PCI D...
Question 16: An entity is using custom software in their CDE.The custom s...
Question 17: Security policies and operational procedures should be?...
Question 18: The intent of assigning a risk ranking to vulnerabilities is...
Question 19: Which of the following statements is true regarding track eq...
Question 20: If disk encryption is used to protect account data what requ...
Question 21: Assigning a unique ID to each person is intended to ensure?...
Question 22: What process is requited by PCI DSS (or protecting card-read...
Question 23: Which statement about PAN is true?...
Question 24: What must the assessor verify when testing that PAN is prote...
Question 25: An organization has implemented a change-detection mechanism...
Question 26: According torequirement 1,what is the purpose of "Network Se...
Question 27: An organization wishes to implement multi-factor authenticat...