The Payment Card Industry Data Security Standard (PCI DSS) contains six different categories of control objectives. Each objective contains one or more requirements, which must be followed in order to achieve compliance. Which of the following requirements would best fit under the objective, "Implement strong access control measures"?
Certified Ethical Hacker 1

Quiz
•
Other
•
University
•
Hard
Evgeny Stroev
Used 19+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Regularly test security systems and processes.
Encrypt transmission of cardholder data across open, public networks.
Assign a unique ID to each person with computer access.
Use and regularly update anti-virus software on all systems commonly affected by malware.
2.
MULTIPLE CHOICE QUESTION
3 mins • 5 pts
Which of the following act requires employer's standard national numbers to identify them on standard transactions?
SOX
HIPAA
DMCA
PCI DSS
3.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which of the following is an NMAP script that could help detect HTTP Methods such as GET, POST, HEAD, PUT, DELETE, TRACE?
http-git
http-headers
http enum
http-methods
4.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Sid is a judge for a programming contest. Before the code reaches him it goes through a restricted OS and is tested there. If it passes, then it moves onto Sid. What is this middle step called?
Fuzzy-testing the code
Third party running the code
Sandboxing the code
String validating the code
5.
MULTIPLE CHOICE QUESTION
3 mins • 5 pts
What is the process of logging, recording, and resolving events that take place in an organization?
Incident Management Process
Protection Policy
Security Policy
Metrics
6.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
A hacker has managed to gain access to a Linux host and stolen the password file from /etc/passwd. How can he use it?
The password file does not contain the passwords themselves.
He can open it and read the user ids and corresponding passwords.
He can open it and read the user ids and corresponding passwords.
He cannot read it because it is encrypted.
7.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Darius is analysing IDS logs. During the investigation, he noticed that there was nothing suspicious found and an alert was triggered on normal web application traffic. He can mark this alert as:
False-Negative
False-Positive
True-Positive
False-Signature
Create a free account and access millions of resources
Similar Resources on Quizizz
9 questions
Seguridad de red

Quiz
•
University
10 questions
แบบทดสอบก่อนเรียน

Quiz
•
University
6 questions
GDPR and Cybersecurity Assessment

Quiz
•
University - Professi...
10 questions
Quiz-ApiFundamentalsWorkshop

Quiz
•
University
7 questions
hari rabu

Quiz
•
University
15 questions
RB Battles Quiz (Roblox)

Quiz
•
KG - Professional Dev...
10 questions
Quizziz

Quiz
•
University
10 questions
Basic Microbit

Quiz
•
11th Grade - Professi...
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade