adplus-dvertising
frame-decoration

Question

According to PCI DSS, what is one of the requirements for penetration testing methodology?

a.

Testing only the internal network

b.

Using a methodology based on NIST SP800-115

c.

Ignoring segmentation controls and methods

d.

Conducting penetration tests without any defined scope

Answer: (b).Using a methodology based on NIST SP800-115 Explanation:PCI DSS requires a methodology for penetration testing that is based on industry-accepted approaches, such as NIST SP800-115.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. According to PCI DSS, what is one of the requirements for penetration testing methodology?

Similar Questions

Discover Related MCQs

Q. What is included in the scope of penetration tests according to PCI DSS?

Q. What is the frequency requirement for external penetration testing according to PCI DSS?

Q. What are the two major benefits of using internal teams for penetration testing?

Q. What are the primary disadvantages of using internal teams for penetration testing?

Q. What is important if an organization chooses to use an internal penetration testing team?

Q. What benefit do external penetration testing teams generally bring?

Q. What is the significance of conducting periodic penetration tests?

Q. For what reason are periodic penetration tests considered necessary?

Q. Why is it important to rotate team members in penetration testing?

Q. What is the primary focus of the Information Gathering and Vulnerability Scanning stage in the penetration testing process?

Q. What is the Cyber Kill Chain model?

Q. How many stages are there in the Cyber Kill Chain model?

Q. What is the equivalent phase in the penetration testing process to the Cyber Kill Chain's "Reconnaissance" phase?

Q. What is the purpose of the "Weaponization" phase in the Cyber Kill Chain?

Q. What happens during the "Delivery" phase in the Cyber Kill Chain?

Q. What is the objective of the "Installation" phase in the Cyber Kill Chain?

Q. What is the purpose of the "Command and Control" stage in a cyber attack?

Q. What may the attacker do during the "Actions on Objectives" stage of an attack?

Q. How might the attacker use a compromised system during the "Actions on Objectives" stage?

Q. What does the "Actions on Objectives" stage of an attack include?