exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 215 discussion

Actual exam question from CompTIA's PT0-002
Question #: 215
Topic #: 1
[All PT0-002 Questions]

During an internal penetration test against a company, a penetration tester was able to navigate to another part of the network and locate a folder containing customer information such as addresses, phone numbers, and credit card numbers. To be PCI compliant, which of the following should the company have implemented to BEST protect this data?

  • A. Vulnerability scanning
  • B. Network segmentation
  • C. System hardening
  • D. Intrusion detection
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Nikamy
5 months, 3 weeks ago
To be PCI compliant you need to do Network segmentation but, BUT in the question it is said that we already come from another network.. hmm
upvoted 1 times
...
pepgua
11 months ago
The BEST control to protect customer data like credit card numbers for PCI compliance is: B. Network segmentation Network segmentation isolates different parts of the network. In this case, ideally, the customer information folder should be placed in a separate network segment with stricter access controls. This would make it much harder for an attacker who has breached one part of the network (like the penetration tester) to access the sensitive data in another segment. PCI DSS (Payment Card Industry Data Security Standard) specifically requires that organizations implement network segmentation to isolate the cardholder data environment (CDE) from the rest of the network. This helps to ensure that even if an attacker gains access to a system on the network, they wouldn't have easy access to the sensitive credit card data.
upvoted 1 times
...
deeden
1 year, 1 month ago
Selected Answer: B
The term "another part of the network" here may very well mean separate VLANs. However, it's important to consider that network segmentation can be achieved through various methods beyond VLANs. For example, organizations can use physical network segmentation (e.g., separate physical networks), subnetting, firewall rules, or access control lists (ACLs) to segment their networks.
upvoted 1 times
...
[Removed]
1 year, 5 months ago
Selected Answer: B
This is on another question. I can't remember which one, but it's the same answer basically.
upvoted 1 times
...
solutionz
1 year, 9 months ago
Selected Answer: B
To be PCI compliant and protect sensitive customer information such as addresses, phone numbers, and credit card numbers, the company should have implemented B. Network segmentation.
upvoted 2 times
...
[Removed]
2 years, 2 months ago
B is correct
upvoted 2 times
...
kloug
2 years, 2 months ago
bbbbbbbbbb
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago