SAQ C Support Test

Is this your test? Login to manage it. If not, you can create a test just like it.

This is a non-interactive preview of the quiz content.

1.
5 points
Which type of I.P. address is the least secure of the two?
2.
5 points
A system designed to prevent unauthorized access to or from a private network is called:
3.
5 points
What is inbound Internet traffic?
4.
5 points
A perimeter firewall controls and restricts traffic between the internal network and other networks.
5.
1 point
Dynamic packet filtering is also known as:
6.
1 point
Creating a wireless ___ for public access to your network can help protect sensitive network resources.
7.
5 points
LAN means:
8.
5 points
Which wireless protection security control was prohibited as of 30th June, 2010?
9.
1 point
When transmitting sensitive data through the Internet, SSL provides:
10.
5 points
Which of the following is considered to be Sensitive Authentication Data?
11.
5 points
Using the same password twice is considered two-factor authentication
12.
5 points
An IPS that does not allow the external vulnerability scan to enter the targeted network results in a pass
13.
1 point
Secure Shell was designed as a replacement for ___ and other insecure remote shell protocols.
14.
1 point
Select two known Certificate Authorities
15.
5 points
An untrusted network is any network that is external to the networks belonging to the entity under review, and/or which is out of the entity's ability to control or manage.
16.
1 point
A Cat5e cable is another name for:
17.
1 point
PPTP (Point to Point Tunneling Protocol) is a Virtual Private Network protocol
18.
5 points
PAN truncation is an encryption method
19.
1 point
Requirement 10.7 states that a merchant must retain audit log history for at least
20.
5 points
Employee owned devices on the CDE network should have which of the following installed?