Which of the following is true regarding internal vulnerability scans?
Answer : A
Comprehensive Detailed Step by Step Explanation with All PCI DSS and Qualified Security Assessor V4 References
Relevant PCI DSS Requirement: Internal vulnerability scans are discussed under PCI DSS Requirement 11.3.1, which requires organizations to perform internal vulnerability scanning as part of their regular vulnerability management process.
Frequency and Trigger for Internal Scans:
PCI DSS v4.0 explicitly states that internal vulnerability scans should be conducted at least quarterly and after any significant change.
A 'significant change' can include modifications such as infrastructure upgrades, addition of new systems or software, and configuration changes that may impact security.
Approved Scanning Vendor (ASV):
Internal scans do not require an Approved Scanning Vendor (ASV). ASVs are specifically used for external vulnerability scans.
Qualified Security Assessor (QSA) Involvement:
QSAs are not mandated to perform internal scans. Organizations can use internal teams or trusted third-party resources for this purpose, provided the scans meet PCI DSS criteria.
Annual Scanning Misconception:
While annual compliance reports may include details of scanning activities, the requirement for internal scans is at least quarterly and event-triggered, not annually.
Reference Verification:
Requirement 11.3.1 (PCI DSS v4.0): Clearly outlines the need for quarterly scans and post-significant-change scans.
ROC and SAQ Templates: Reinforce the requirement that scans are both regular and reactive to environmental changes.
What is the intent of classifying media that contains cardholder data?
Answer : A
Purpose of Classifying Media
PCI DSS v4.0 emphasizes the need to classify media based on the sensitivity of the data it contains. Media classification ensures appropriate handling, storage, and destruction processes.
Media Protection Requirements
Media containing cardholder data must be securely stored, transferred, and destroyed when no longer needed.
Classification informs the level of protection required, such as encryption, physical security, or controlled access.
Incorrect Options
Option B: Moving media quarterly is not a requirement.
Option C: Labeling as 'Confidential' is insufficient without a comprehensive protection strategy.
Option D: Destruction schedules should depend on retention requirements and data sensitivity, not a universal timeline.
Which of the following describes "stateful responses" to communication Initiated by a trusted network?
Answer : B
Stateful Inspection
PCI DSS Requirement 1.2 specifies the need for stateful inspection to track the state of active connections. This ensures that only valid responses to communication initiated by trusted networks are allowed.
Invalid or unsolicited response traffic is blocked to prevent exploitation of vulnerabilities.
Key Functionality of Stateful Firewalls
Stateful firewalls maintain session information and only allow traffic that matches an existing session or expected response.
Incorrect Options
Option A: Administrative access restrictions are important but unrelated to stateful responses.
Option C: Baseline configurations are a different security control.
Option D: Logging and correlation are for threat detection, not stateful response.
An organization has implemented a change-detection mechanism on their systems. How often must critical file comparisons be performed?
Answer : A
PCI DSS Requirement for File Integrity Monitoring (FIM):
Requirement 11.5 mandates the use of file integrity monitoring to detect unauthorized changes to critical files, and comparisons must be performed at least weekly unless otherwise defined and justified in the entity's risk assessment.
Purpose of Weekly Comparisons:
Ensures timely detection of unauthorized modifications, reducing the risk of compromise.
Invalid Options:
B/D: These timeframes are not specific to PCI DSS unless documented as part of a risk-based approach.
C: Comparisons must occur regularly, not just after changes are installed.
An organization wishes to implement multi-factor authentication for remote access, using the user's Individual password and a digital certificate. Which of the following scenarios would meet PCI DSS requirements for multi-factor authentication?
Answer : B
Multi-Factor Authentication (MFA)
MFA requires at least two factors from different categories: something you know (password), something you have (digital certificate), or something you are (biometric).
PCI DSS Requirement 8 mandates that credentials like certificates must be unique to each user.
Secure Certificate Use
Certificates must not be shared and should be assigned individually to ensure accountability and prevent unauthorized access.
Incorrect Options
Option A: Limiting certificates to administrative groups does not fulfill PCI DSS for all users.
Option C: Logging certificates for retrieval is unrelated to security requirements.
Option D: Certificates do not have a mandatory 90-day change requirement.
What do PCI DSS requirements for protecting cryptographic keys include?
Answer : C
Key Management Requirements:
PCI DSS Requirement 3.5 specifies the protection of cryptographic keys, including encryption, storage in secure cryptographic devices (SCDs), or as key components to ensure security and prevent unauthorized access.
Clarifications on Cryptographic Key Protection:
A/B: Public keys and key strength requirements are not specified in this context.
D: Separation of duties mandates that key-encrypting and data-encrypting keys must not be assigned to the same custodian.
Testing and Validation:
QSAs verify compliance by examining key management practices, storage mechanisms, and access controls for cryptographic keys during the assessment.
Which statement is true regarding the use of intrusion detection techniques, such as intrusion detection systems and/or Intrusion protection systems (IDS/IPS)?
Answer : B
PCI DSS Requirement:
Requirement 11.4 mandates the implementation of intrusion detection and/or intrusion prevention techniques to alert personnel of suspected compromises within the cardholder data environment (CDE).
Purpose of IDS/IPS:
These systems are deployed to identify potential threats and alert relevant personnel, enabling them to take corrective actions to prevent data breaches.
Rationale Behind Correct Answer:
A: Intrusion detection is required only for in-scope components, not all system components.
C/D: Intrusion detection systems do not perform isolation or identification of all cardholder data; they monitor for and alert on potential intrusions.