100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

PCI ISA FLASHCARDS 3.2.1 QUESTIONS AND ANSWERS

Puntuación
-
Vendido
-
Páginas
10
Grado
A+
Subido en
25-11-2025
Escrito en
2025/2026

PCI ISA FLASHCARDS 3.2.1 QUESTIONS AND ANSWERS

Institución
PCI ISA FLASHCARDS 3.2.1
Grado
PCI ISA FLASHCARDS 3.2.1









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
PCI ISA FLASHCARDS 3.2.1
Grado
PCI ISA FLASHCARDS 3.2.1

Información del documento

Subido en
25 de noviembre de 2025
Número de páginas
10
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Vista previa del contenido

PCI ISA FLASHCARDS 3.2.1 QUESTIONS AND ANSWERS




Non-console administrator access to any web-based management interfaces must be encrypted with
technology such as......... - (ANSWER)HTTPS



Requirements 2.2.2 and 2.2.3 cover the use of secure services, protocols and daemons. Which of the
following is considered to be secure? - (ANSWER)SSH



Which of the following is considered "Sensitive Authentication Data"? - (ANSWER)Card Verification
Value (CAV2/CVC2/CVV2/CID), Full Track Data, PIN/PIN Block



True or False: It is acceptable for merchants to store Sensitive Authentication after authorization as long
as it is strongly encrypted? - (ANSWER)False



When a PAN is displayed to an employee who does NOT need to see the full PAN, the minimum digits to
be masked are: - (ANSWER)All digits between the first six and last four



Which of the following is true regarding protection of PAN? - (ANSWER)PAN must be rendered
unreadable during transmission over public, wireless networks



Which of the following may be used to render PAN unreadable in order to meet requirement 3.4? -
(ANSWER)Hashing the entire PAN using strong cryptography



True or False Where keys are stored on production systems, split knowledge and dual control is
required? - (ANSWER)True



When assessing requirement 6.5, testing to verify secure coding techniques are in place to address
common coding vulnerabilities includes: - (ANSWER)Reviewing software development policies and
procedures



One of the principles to be used when granting user access to systems in CDE is: - (ANSWER)Least
privilege

, PCI ISA FLASHCARDS 3.2.1 QUESTIONS AND ANSWERS




An example of a "one-way" cryptographic function used to render data unreadable is: - (ANSWER)SHA-2



A set of cryptographic hash functions designed by the National Security Agency (NS). - (ANSWER)SHA-2
(Secure Hash Algorithm



True or False: Procedures must be developed to easily distinguish the difference between onsite
personnel and visitors. - (ANSWER)True



When should access be revoked of recently terminated employees? - (ANSWER)immediately



True or False: A visitor with a badge may enter sensitive area unescorted. - (ANSWER)False, visitors must
be escorted at all times.



Protection of keys used for encryption of cardholder data against disclosure must include at least: (4
items) - (ANSWER)*Access to keys is restricted to the fewest number of custodians necessary

*Key-encrypting keys are at least as strong as the data-encrypting keys they protect

*Key encrypting keys are stored separately from data-encrypting keys

*Keys are stored securely in the fewest possible locations



Description of cryptographic architecture includes: - (ANSWER)*Details of all algorithms, protocols, and
keys used for the protection of cardholder data, including key strength and expiry date

*Description of the key usage for each key

*Inventory of any HSMs and other SCDs used for key management



What 2 methods must NOT be used to be disk-level encryption compliant - (ANSWER)*Cannot use the
same user account authenticator as the operating system

*Cannot use a decryption key that is associated with or derived from the systems local user account
database or general network login credentials.



6 months - (ANSWER)DESV User accounts and access privileges are reviewed at least every______
$19.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Avanarriss Teachme2-tutor
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1293
Miembro desde
1 año
Número de seguidores
0
Documentos
1242
Última venta
1 semana hace

Smart documents for smart Studiers graded A+....All the best

4.9

264 reseñas

5
247
4
13
3
3
2
1
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes