all network transmissions must be logged by an entity’s security information and event management (SIEM) system or equivalent tool, which means they should record all network events and activities related to cardholder data processing and transmission. This is one of the requirements for ensuring that network transmissions are monitored and audited.
Question 2
A "Partial Assessment is a new assessment result What is a ‘Partial Assessment’?
Options:
A.
A ROC that has been completed after using an SAQ to determine which requirements should be tested. As per FAQ 1331. (As long as the entity meets the SAQs eligibility criteria)
B.
An interim result before the final ROC has been completed
C.
A term used by payment brands and acquirers to describe entities that have multiple payment channels with each channel having its own assessment
D.
An assessment with at least one requirement marked as Not Tested”
Answer:
D
Explanation:
Explanation:
According to requirement 3.1.2, an assessment with at least one requirement marked as Not Tested is considered a partial assessment, which means it does not meet all the requirements and controls defined in Appendix E of the PCI DSS v3.2.1 Quick Reference Guide1. This is one of the requirements for ensuring that assessments are conducted in accordance with PCI DSS.
Question 3
The intent of assigning a risk ranking to vulnerabilities is to?
Options:
A.
Ensure all vulnerabilities are addressed within 30 days
B.
Replace the need to quarterly ASV scans
C.
Prioritize the highest risk items so they can be addressed more quickly
D.
Ensure that critical security patches are installed at least quarterly
Answer:
C
Explanation:
Explanation:
According to the PCI DSS v3.2.1 Quick Reference Guide1, the intent of assigning a risk ranking to vulnerabilities is to prioritize the highest risk items so they can be addressed more quickly, rather than ensuring all vulnerabilities are addressed within 30 days or replacing the need to quarterly ASV scans or ensuring that critical security patches are installed at least quarterly. This is one of the requirements for ensuring that vulnerabilities are identified and mitigated as soon as possible.