<< Prev Question Next Question >>

Question 20/28

An organization has implemented a change-detection mechanism on their systems. How often must critical file comparisons be performed?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (28q)
Question 1: Where an entity under assessment is using the customized app...
Question 2: Which of the following can be sampled for testing during a P...
Question 3: If disk encryption is used to protect account data what requ...
Question 4: According to requirement 1, what is the purpose of "Network ...
Question 5: An entity wants to know if the Software Security Framework c...
Question 6: What process is requited by PCI DSS for protecting card-read...
Question 7: Which of the following is required to be included in an inci...
Question 8: What must the assessor verify when testing that PAN is prote...
Question 9: Which of the following describes the intent of installing on...
Question 10: If an entity shares cardholder data with a TPSP, what activi...
Question 11: Which of the following types of events is required to be log...
Question 12: Which statement about the Attestation of Compliance (AOC) is...
Question 13: Which of the following describes "stateful responses' to com...
Question 14: The intent of assigning a risk ranking to vulnerabilities is...
Question 15: A sample of business facilities is reviewed during the PCI D...
Question 16: An internal NTP server that provides time services to the Ca...
Question 17: Which systems must have anti-malware solutions'...
Question 18: If an entity shares cardholder data with a TPSP, what activi...
Question 19: What should the assessor verify when testing that cardholder...
Question 20: An organization has implemented a change-detection mechanism...
Question 21: Assigning a unique ID to each person is intended to ensure?...
Question 22: According to the glossary, bespoke and custom software descr...
Question 23: What does the PCI PTS standard cover?...
Question 24: An entity wants to use the Customized Approach. They are uns...
Question 25: Viewing of audit log files should be limited to?...
Question 26: What is the intent of classifying media that contains cardho...
Question 27: Which scenario meets PCI DSS requirements for restricting ac...
Question 28: Which of the following statements is true whenever a cryptog...