Which of the following requirements is part of the “Maintain a vulnerability management program” PCI DSS core principle?

A) Install and maintain a firewall configuration to protect cardholder data.
B) Develop and maintain secure systems and architecture.
C) Protect all systems against malware and regularly update antivirus software.
D) Encrypt transmission of cardholder data across open, public networks.


C) Protect all systems against malware and regularly update antivirus software.

Computer Science & Information Technology

You might also like to view...

If a workbook contains multiple worksheets that contain either an identical structure or data with identical row and column labels, a user can create a summary worksheet using the ________ feature

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When designating a wireless profile, the All-user profiles option applies to all users of the computer ___________

a. And are connected when a specific user logs on b. And are connected regardless of which user is logged on c. And are connected manually by the administrator d. None of the above

Computer Science & Information Technology

A ____ item is a main item in a list.

A. base-level B. root C. sub- D. first-level

Computer Science & Information Technology

You have just connected a brand new workstation to your local network. As per company policy, you have used a static IP configuration. However, all attempts to reach the Internet from the workstation fail. You have verified that you can communicate with servers and other workstations on the local network, and that you are the only one having an issue reaching the Internet. What is most likely the issue?

A. incorrectly configured gateway address B. DNS issues C. wrong IP address for the workstation D. incorrectly configured MAC address

Computer Science & Information Technology