Question 41

When working in the Payment Card Industry (PCI), how often should security logs be review to comply with the standards?
  • Question 42

    SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
  • Question 43

    Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?
  • Question 44

    SCENARIO: Critical servers show signs of erratic behavior within your organization's intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
    What phase of the response provides measures to reduce the likelihood of an incident from recurring?
  • Question 45

    What role should the CISO play in properly scoping a PCI environment?