Requirements Flashcards

1
Q

What is Requirement 1?

A

Install and maintain network security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Requirement 2?

A

Apply Secure Configurations to all Network Components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Requirement 3?

A

Protect Stored Account Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Requirement 4?

A

Protect Cardholder Data with Strong Cryptography During Transmission Over Open, Public Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Requirement 5?

A

Protect All Systems and Networks from Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Requirement 6?

A

Develop and Maintain Secure Systems and Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Requirement 7?

A

Restrict Access to System Components and Cardholder Data by Business Need to Know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Requirement 8?

A

Identify Users and Authenticate Access to System Components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Requirement 9?

A

Restrict Physical Access to Cardholder Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Requirement 10?

A

Log and Monitor All Access to System Components and Cardholder Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Requirement 11?

A

Test Security of Systems and Networks Regularly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Requirement 12?

A

Support Information Security with Organizational Policies and Programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 6 control objectives of PCI?

A
  1. Build and maintain a secure network and systems
  2. Protect account data
  3. Maintain a vulnerability management program
  4. Implement strong access control measures
  5. Regularly monitor and test networks
  6. Maintain an information security policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly