100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

PCI Ch 15 | Scholar’s Advantage Test : Practice Questions with Solutions | Rated A+

Rating
-
Sold
-
Pages
17
Grade
A+
Uploaded on
05-06-2025
Written in
2024/2025

The majority of payment card fraud is borne by _____. consumers banks, merchants, and card processors Visa and MasterCard All of the above - Correct Answer banks, merchants, and card processors The terms CVV2, CID, CVC2, and CVV2 all refer to the _____. authentication data security code expiration date account number - Correct Answer security code

Show more Read less
Institution
PCI Ch 15
Course
PCI Ch 15










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
PCI Ch 15
Course
PCI Ch 15

Document information

Uploaded on
June 5, 2025
Number of pages
17
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

PCI Ch 15 Test

The majority of payment card fraud is borne by _____.


consumers


banks, merchants, and card processors


Visa and MasterCard


All of the above - Correct Answer ✔ ✔ banks, merchants, and

card processors


The terms CVV2, CID, CVC2, and CVV2 all refer to the _____.


authentication data


security code


expiration date


account number - Correct Answer ✔ ✔ security code

,There are 12 categories of PCI standards. In order to be considered

compliant, an entity must comply with or document compensating

controls for _____.


All of the requirements


90% of the requirements


80% of the requirements


70% of the requirements - Correct Answer ✔ ✔ All of the

requirements


Which of the following best describes log data?


Log data can be used to identify indicators of compromise.


Log data can be used to identify primary account numbers.


Log data can be used to identify sensitive authentication data.


Log data can be used to identify cardholder location. - Correct Answer

✔ ✔ Log data can be used to identify indicators of compromise.

, Which of the following documents lists injection flaws, broken

authentication, and cross-site scripting as the top three application

security flaws?


ISACA Top Ten


NIST Top Ten


OWASP Top Ten


ISO Top Ten - Correct Answer ✔ ✔ OWASP Top Ten


Which of the following is an example of two-factor authentication?


Username and password


Password and challenge question


Username and token


Token and PIN - Correct Answer ✔ ✔ Username and password


Which of the following is considered a secure transmission

technology?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
jackline98 Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
259
Member since
2 year
Number of followers
152
Documents
9862
Last sold
1 month ago

Here you will find different past papers with correct and updated solutions .Please do not forget to leave a review after purchasing any document .Goodluck and success in advance.

3.3

60 reviews

5
20
4
11
3
9
2
5
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions