Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

PCI Internal Security Assessor RetakeExam

Last Update 17 hours ago Total Questions : 62

The PCI Internal Security Assessor RetakeExam content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include ISA-N_Retake practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our ISA-N_Retake exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these ISA-N_Retake sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any PCI Internal Security Assessor RetakeExam practice test comfortably within the allotted time.

Question # 11

Which systems must have anti-malware solutions'

A.

All CDE systems, connected systems. NSCs. and security-providing systems

B.

All portable electronic storage

C.

All systems that store PAN

D.

Any in-scope system except for those identified as not at risk from malware

Question # 12

If disk encryption is used to protect account data what requirement should be met for the disk encryption solution?

A.

Access to the disk encryption must be managed independently of the operating system access control mechanisms

B.

The disk encryption system must use the same user account authenticator as the operating system

C.

The decryption keys must be associated with the local user account database

D.

The decryption keys must be stored within the local user account database

Question # 13

What is the intent of classifying media that contains cardholder data?

A.

Ensuring that media is property protected according to the sensitivity of the data it contains

B.

Ensuring that media containing cardholder data is moved from secured areas an a quarterly basis

C.

Ensuring that media is clearly and visibly labeled as 'Confidential so all personnel know that the media contains cardholder data

D.

Ensuring that all media is consistently destroyed on the same schedule regardless of the contents

Question # 14

Which of the following is an example of multi-factor authentication?

A.

A token that must be presented twice during the login process

B.

A user passphrase and an application level password.

C.

A user password and a PIN-activated smart card

D.

A user fingerprint and a user thumbprint

Question # 15

What do PCI DSS requirements for protecting cryptographic keys include?

A.

Public keys must be encrypted with a key-encrypting key.

B.

Data-encrypting keys must be stronger than the key-encrypting key that protects it.

C.

Private or secret keys must be encrypted, stored within an SCD or stored as key components

D.

Key-encrypting keys and data-encrypting keys must be assigned to the same key custodian

Question # 16

What would be an appropriate strength for the key-encrypting key (KEK) used to protect an AES 128-bit data-encrypting key (DEK)

A.

DES256

B.

RSA512

C.

AES 128

D.

ROT 13

Question # 17

Which of the following is true regarding internal vulnerability scans?

A.

They must be performed after a significant change.

B.

They must be performed by an Approved Scanning Vendor (ASV).

C.

They must be performed by QSA personnel.

D.

They must be performed at least annually.

Question # 18

A network firewall has been configured with the latest vendor security patches What additional configuration is needed to harden the firewall?

A.

Remove the default 'Firewall Administrator account and create a shared account for firewall administrators to use.

B.

Configure the firewall to permit all traffic until additional rules are defined

C.

Synchronize the firewall rules with the other firewalls m the environment

D.

Disable any firewall functions that are not needed in production

Go to page: