100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

PCI ISA Flashcards 3.2.1 100% correct

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
07-06-2023
Written in
2022/2023

PCI ISA Flashcards 3.2.1 100% correct For PCI DSS requirement 1, firewall and router rule sets need to be reviewed every _____________ months -CORRECT ANSWER- 6 months Non-console administrator access to any web-based management interfaces must be encrypted with technology such as......... -CORRECT ANSWER- HTTPS Requirements 2.2.2 and 2.2.3 cover the use of secure services, protocols and daemons. Which of the following is considered to be secure? -CORRECT ANSWER- SSH Which of the following is considered "Sensitive Authentication Data"? -CORRECT ANSWER- Card Verification Value (CAV2/CVC2/CVV2/CID), Full Track Data, PIN/PIN Block True or False: It is acceptable for merchants to store Sensitive Authentication after authorization as long as it is strongly encrypted? -CORRECT ANSWER- False When a PAN is displayed to an employee who does NOT need to see the full PAN, the minimum digits to be masked are: -CORRECT ANSWER- All digits between the first six and last four Which of the following is true regarding protection of PAN? -CORRECT ANSWER- PAN must be rendered unreadable during transmission over public, wireless networks Which of the following may be used to render PAN unreadable in order to meet requirement 3.4? -CORRECT ANSWER- Hashing the entire PAN using strong cryptography True or False Where keys are stored on production systems, split knowledge and dual control is required? -CORRECT ANSWER- True When assessing requirement 6.5, testing to verify secure coding techniques are in place to address common coding vulnerabilities includes: -CORRECT ANSWER- Reviewing software development policies and procedures One of the principles to be used when granting user access to systems in CDE is: -CORRECT ANSWER- Least privilege An example of a "one-way" cryptographic function used to render data unreadable is: -CORRECT ANSWER- SHA-2 A set of cryptographic hash functions designed by the National Security Agency (NS). -CORRECT ANSWER- SHA-2 (Secure Hash Algorithm Inactive user accounts should be either removed or disabled within___ -CORRECT ANSWER- 90 days True or False: Procedures must be developed to easily distinguish the difference between onsite personnel and visitors. -CORRECT ANSWER- True When should access be revoked of recently terminated employees? -CORRECT ANSWER- immediately True or False: A visitor with a badge may enter sensitive area unescorted. -CORRECT ANSWER- False, visitors must be escorted at all times. Protection of keys used for encryption of cardholder data against disclosure must include at least: (4 items) -CORRECT ANSWER- *Access to keys is restricted to the fewest number of custodians necessary *Key-encrypting keys are at least as strong as the data-encrypting keys they protect *Key encrypting keys are stored separately from data-encrypting keys *Keys are stored securely in the fewest possible locations Description of cryptographic architecture includes: -CORRECT ANSWER- *Details of all algorithms, protocols, and keys used for the protection of cardholder data, including key strength and expiry date *Description of the key usage for each key *Inventory of any HSMs and other SCDs used for key management What 2 methods must NOT be used to be disk-level encryption compliant -CORRECT ANSWER- *Cannot use the same user account authenticator as the operating system *Cannot use a decryption key that is associated with or derived from the systems local user account database or general network login credentials. 6 months -CORRECT ANSWER- DESV User accounts and access privileges are reviewed at least every______ Track 1 (Length up to 79 characters) -CORRECT ANSWER- Contains all fields of both Track 1 and Track 2 Track 2 (Length up to 40 characters) -CORRECT ANSWER- Provides shorter processing time for older dial-up transmissions. DESV -CORRECT ANSWER- Designated Entities Supplemental Validation DESV Requirements: -CORRECT ANSWER- *Implementing a PCI DSS Compliance program *Document and validate PCI DSS Scope *Validate PCI DSS is incorporated into business-as-usual (BAU) activities *Control and manage logical access to cardholder data environment *Identify and respond to suspicious events Who could DESV requirements apply to? -CORRECT ANSWER- Those that have suffered significant or repeated breaches of cardholder data. PCI DSS requirements apply to_____ -CORRECT ANSWER- people, processes, and technologies When planning for an assessment what 4 activities should be included during planning? -CORRECT ANSWER- *List of people to be interviewed, system components used, documentation (training, payment logs), facilities (physical security) *Ensure assessor is familiar with technologies in assessment *If sampling, verify sample section and size is representative of the entire population *Identify the roles and the individuals within each role to be interviewed as part of the assessment What pre-assessment activities should an assessor consider when preparing for an assessment? -CORRECT ANSWER- *Ensure assessor(s) has competent knowledge of the technologies being assessed *Identify types of system components and locations of facilities to be reviewed *Consider size and complexity of the environment to be assessed. When does authorization occur -CORRECT ANSWER- At time of purchase

Show more Read less
Institution
PCIISA
Course
PCIISA









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
PCIISA
Course
PCIISA

Document information

Uploaded on
June 7, 2023
Number of pages
9
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.39
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
RobetoAcademics

Get to know the seller

Seller avatar
RobetoAcademics Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
2 year
Number of followers
0
Documents
202
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions