In wireless environments connected to the cardholder data environment, which action should be taken at installation?

Study for the PCI Data Security Standard Exam. Master your knowledge with interactive flashcards and multiple-choice questions, each with hints and explanations. Prepare confidently for your certification test!

Multiple Choice

In wireless environments connected to the cardholder data environment, which action should be taken at installation?

Explanation:
Defaults on wireless devices are easy targets for attackers. At installation, any wireless device connected to the cardholder data environment should be hardened by changing all vendor defaults—encryption keys, passwords, and SNMP community strings. These defaults are often published or easily guessable, so leaving them in place gives an attacker quick access to the device and potentially the network. By applying unique credentials and fresh keys from the start, you remove that predictable entry point and greatly reduce the risk of compromise. Relying on only changing passwords or on existing controls, or disabling wireless until PCI scope changes are impractical approaches when proper hardening is feasible now. This practice aligns with PCI DSS guidance that vendor defaults should not be used for security parameters.

Defaults on wireless devices are easy targets for attackers. At installation, any wireless device connected to the cardholder data environment should be hardened by changing all vendor defaults—encryption keys, passwords, and SNMP community strings. These defaults are often published or easily guessable, so leaving them in place gives an attacker quick access to the device and potentially the network. By applying unique credentials and fresh keys from the start, you remove that predictable entry point and greatly reduce the risk of compromise. Relying on only changing passwords or on existing controls, or disabling wireless until PCI scope changes are impractical approaches when proper hardening is feasible now. This practice aligns with PCI DSS guidance that vendor defaults should not be used for security parameters.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy