What is required to ensure antivirus cannot be disabled or altered by users?

Prepare for the PCI DSS Requirements Test with our interactive quizzes. Use multiple choice questions, flashcards, and detailed explanations. Ace your exam with confidence!

Multiple Choice

What is required to ensure antivirus cannot be disabled or altered by users?

Explanation:
Tamper resistance for security software and a formal exception process are essential. The strongest requirement is that antivirus cannot be disabled or altered by users unless management explicitly authorizes it on a case-by-case basis for a limited time. This creates an auditable control that prevents end users from turning off protection and ensures any temporary disablement is approved, time-bound, and supervised. It directly enforces continuous protection across systems, which is the core reason antivirus effectiveness depends on preventing user tampering and on controlled exceptions. While keeping logs is important for investigation, and having the software actively running or installed on all devices is necessary, those factors alone do not guarantee prevention of tampering. You can have logs, running status, and full deployment, but without a governance process that restricts user-initiated changes, protection can still be disabled without authorization.

Tamper resistance for security software and a formal exception process are essential. The strongest requirement is that antivirus cannot be disabled or altered by users unless management explicitly authorizes it on a case-by-case basis for a limited time. This creates an auditable control that prevents end users from turning off protection and ensures any temporary disablement is approved, time-bound, and supervised. It directly enforces continuous protection across systems, which is the core reason antivirus effectiveness depends on preventing user tampering and on controlled exceptions.

While keeping logs is important for investigation, and having the software actively running or installed on all devices is necessary, those factors alone do not guarantee prevention of tampering. You can have logs, running status, and full deployment, but without a governance process that restricts user-initiated changes, protection can still be disabled without authorization.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy