Return to course: Vulnerability Management: An Overview of PCI DSS Requirements 5, 6, & 11
Previous Lesson
Previous
Course Overview
Vulnerability Management: An Overview of PCI DSS Requirements 5, 6, & 11
Vulnerability Management Part 1 (5 minutes)
Introduction, Acronyms, & Definitions
Question 1
Question 2
Question 3
Question 4
Vulnerability Management Part 2 (25 minutes)
The 4 Common Types of Vulnerabilities
Question 1
Question 2
Question 3
Question 4
Question 5
Question 6
Question 7
Question 8
Vulnerability Management Part 3 (45 minutes)
The 5 Components of a Kick Ass Vulnerability Management Program
Question 1
Question 2
Question 3
Question 4
Question 5
Question 6
Question 7
Question 8
Question 8
If network segmentation is used to isolate the CDE, a pen test is used to confirm that the segmentation controls/methods are operational and effective, and isolate the CDE from all out-of-scope systems.
*
True
False