PCI SSC Related Exams
Assessor_New_V4 Exam
Which statement is true regarding the use of intrusion detection techniques, such as intrusion detection systems and/or intrusion protection systems (IDS'IPS)?
An organization has implemented a change-detection mechanism on their systems. How often must critical file comparisons be performed?
Which of the following is required to be included in an incident response plan?