<< Prev Question Next Question >>

Question 24/28

An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA. while also ensuing that the customized control is implemented securely. Which of the following statements is true?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (28q)
Question 1: Where an entity under assessment is using the customized app...
Question 2: Which of the following can be sampled for testing during a P...
Question 3: If disk encryption is used to protect account data what requ...
Question 4: According to requirement 1, what is the purpose of "Network ...
Question 5: An entity wants to know if the Software Security Framework c...
Question 6: What process is requited by PCI DSS for protecting card-read...
Question 7: Which of the following is required to be included in an inci...
Question 8: What must the assessor verify when testing that PAN is prote...
Question 9: Which of the following describes the intent of installing on...
Question 10: If an entity shares cardholder data with a TPSP, what activi...
Question 11: Which of the following types of events is required to be log...
Question 12: Which statement about the Attestation of Compliance (AOC) is...
Question 13: Which of the following describes "stateful responses' to com...
Question 14: The intent of assigning a risk ranking to vulnerabilities is...
Question 15: A sample of business facilities is reviewed during the PCI D...
Question 16: An internal NTP server that provides time services to the Ca...
Question 17: Which systems must have anti-malware solutions'...
Question 18: If an entity shares cardholder data with a TPSP, what activi...
Question 19: What should the assessor verify when testing that cardholder...
Question 20: An organization has implemented a change-detection mechanism...
Question 21: Assigning a unique ID to each person is intended to ensure?...
Question 22: According to the glossary, bespoke and custom software descr...
Question 23: What does the PCI PTS standard cover?...
Question 24: An entity wants to use the Customized Approach. They are uns...
Question 25: Viewing of audit log files should be limited to?...
Question 26: What is the intent of classifying media that contains cardho...
Question 27: Which scenario meets PCI DSS requirements for restricting ac...
Question 28: Which of the following statements is true whenever a cryptog...