COMPLETE QUESTIONS AND CORRECT DETAILED ANSWERS
\VERIFIED 100% GRADED A+\BRAND NEW!!
Who is classified as a non console admin Access A user w elevated privileges connecting
remotely to install a patch.
True about req 3.1 Policies and operational procedures
must be documeneted Operational
procedures must be understood by
personel
True about 3.2 Data retention Policies must cover all account data
storage locations
Acct Data must be securely deleted or uncoverable
when no longer needed Acct data storage must
be limited to only what is required
True about 3.3 Card Verification must not be retained after
merchant authorization SAD store prior to
auth must be encrypted
True about 3.4 The BIN may be reviewed by any personnel
The BIN and last 4 of the PAN are max number of digits
to be seen without a buisness need to see more
PAN can not be copied by unauthorized personnel while
using remote access
True about 3.5 PAN can be rendered unreadable by using one way
hashing
If disk level encryption is used to rended the pan
unreadable the decryption keys must not be
associated w user accts
True about 3.6 Key encrypting keys must be stored separate from data
encrypted keys
Data encrypting keys can be stored if they are
encrypted w a key encrypting key of equivalent
strength
, True about 3.7 If encryption is being used to protect stored acct data
strong cryptographic keys must be generated.
Each key type must have a defined cyrpto period
What happens when data is no longer needed as per Acct data must be
securely deleted and rendered unrecoverable entitys data retention policiy
Along w the last 4 digits which other
digits of a PAN can
BI
N be displayed w no legit reason to see
the full PAN
Example of Keyed cyrptographic hashing algorithim HMAC_SHA256
An AES256 Bit key is beig used to encrypt acct data if key Eiether 2
full length key components or w in the SCD is not stored as a cyrptogram
how must it be stored?
True about req 4.1 Policies must be documented and up to date
operational procedures must be in use and known by all
affected parties
True about 4.2 PAN Sent via email must be secured w cryptography
certificates to safeguard and open network must be
valid
what would prevent a self signed certificate from
being Certificate has
expired used to safeguard PAN when transmitted
over open
public network
What is appropriate to send PAN over email? Encyrpting the file containing the PAN before
attaching it
True about req 5 Malware included trojans and worms
anti malware must protect against spyware and key
loggers
True about 5.2 The deployed anti malware must detect all known types
of malware
They deployed anti malware must remove block or
contain all known types of malware