Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PCI CPSA Exam - Topic 1 Question 13 Discussion

Actual exam question for PCI's CPSA exam
Question #: 13
Topic #: 1
[All CPSA Questions]

A vendor has a list of pre-approved third parties which may be granted access to the facility. Under what circumstances can other third-parties be granted access?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Doug
4 months ago
Seems too risky to let anyone else in, honestly.
upvoted 0 times
...
Lynette
4 months ago
Definitely need management's approval for any exceptions!
upvoted 0 times
...
Demetra
4 months ago
Wait, can third parties really get in if they have insurance?
upvoted 0 times
...
Orville
4 months ago
I think access can be granted if approved by management.
upvoted 0 times
...
Paola
5 months ago
Only the pre-approved list can enter, right?
upvoted 0 times
...
Carma
5 months ago
I recall a similar question where access was restricted unless specific conditions were met, so I'm leaning towards option B as well.
upvoted 0 times
...
Goldie
5 months ago
I'm not entirely sure, but I feel like liability insurance might not be the main factor for granting access.
upvoted 0 times
...
Paris
5 months ago
I think option B sounds right because it aligns with what we practiced about security protocols needing higher-level approval.
upvoted 0 times
...
Mi
5 months ago
I remember discussing that only pre-approved individuals should have access, but there might be exceptions if authorized by management.
upvoted 0 times
...
Pa
5 months ago
I feel confident that the correct answer is B. The question is asking about circumstances for granting access to third parties, and that option seems to cover it.
upvoted 0 times
...
Jutta
5 months ago
Option B sounds like the most logical choice, but I want to double-check the other answers just to be sure I'm not missing anything.
upvoted 0 times
...
Clarence
5 months ago
Hmm, I'm not sure about this one. I'll have to think it through carefully and consider all the options before deciding.
upvoted 0 times
...
Lilli
5 months ago
This question seems straightforward, I think the answer is B - when approved by the physical security manager or senior management.
upvoted 0 times
...
Laurel
6 months ago
Hmm, I'm a bit confused on this one. Is it something about the forwarders pulling data from the search peers? Or was it the search heads storing the data? I'll need to think this through carefully.
upvoted 0 times
...
Joanna
6 months ago
Easy peasy! Preventing the bots from talking to the C2 server is the surefire way to dismantle a botnet. Option A is the clear winner here.
upvoted 0 times
...
Tom
6 months ago
I remember that we did a practice question on yield variance, but the numbers were different. I hope the method is the same though!
upvoted 0 times
...

Save Cancel