which three methodologies should be considered?

When you test an application that requires PCI compliance, which three methodologies
should be considered? (Choose three.)

When you test an application that requires PCI compliance, which three methodologies
should be considered? (Choose three.)

A.
a firewall as part of the topology

B.
two-factor authentication for administrators

C.
mandatory TLS pinning

D.
data loss prevention controls

E.
default system passwords and AAA configuration

F.
in-flight data encryption

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *