100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

PCI ISA Flashcards 3.2.1|Exam Question and Answers 2023/2024

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
30-01-2024
Written in
2023/2024

For PCI DSS requirement 1, firewall and router rule sets need to be reviewed every _____________ months - ANSWER-6 months Non-console administrator access to any web-based management interfaces must be encrypted with technology such as......... - ANSWER-HTTPS Requirements 2.2.2 and 2.2.3 cover the use of secure services, protocols and daemons. Which of the following is considered to be secure? - ANSWER-SSH Which of the following is considered "Sensitive Authentication Data"? - ANSWER-Card Verification Value (CAV2/CVC2/CVV2/CID), Full Track Data, PIN/PIN Block True or False: It is acceptable for merchants to store Sensitive Authentication after authorization as long as it is strongly encrypted? - ANSWER-False When a PAN is displayed to an employee who does NOT need to see the full PAN, the minimum digits to be masked are: - ANSWER-All digits between the first six and last four

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
January 30, 2024
Number of pages
8
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

PCI ISA Flashcards 3.2.1|Exam Question
and Answers 2023/2024
For PCI DSS requirement 1, firewall and router rule sets need to be reviewed every
_____________ months - ANSWER-6 months

Non-console administrator access to any web-based management interfaces must be
encrypted with technology such as......... - ANSWER-HTTPS

Requirements 2.2.2 and 2.2.3 cover the use of secure services, protocols and
daemons. Which of the following is considered to be secure? - ANSWER-SSH

Which of the following is considered "Sensitive Authentication Data"? - ANSWER-Card
Verification Value (CAV2/CVC2/CVV2/CID), Full Track Data, PIN/PIN Block

True or False: It is acceptable for merchants to store Sensitive Authentication after
authorization as long as it is strongly encrypted? - ANSWER-False

When a PAN is displayed to an employee who does NOT need to see the full PAN, the
minimum digits to be masked are: - ANSWER-All digits between the first six and last
four

Which of the following is true regarding protection of PAN? - ANSWER-PAN must be
rendered unreadable during transmission over public, wireless networks

Which of the following may be used to render PAN unreadable in order to meet
requirement 3.4? - ANSWER-Hashing the entire PAN using strong cryptography

True or False Where keys are stored on production systems, split knowledge and dual
control is required? - ANSWER-True

When assessing requirement 6.5, testing to verify secure coding techniques are in place
to address common coding vulnerabilities includes: - ANSWER-Reviewing software
development policies and procedures

One of the principles to be used when granting user access to systems in CDE is: -
ANSWER-Least privilege

An example of a "one-way" cryptographic function used to render data unreadable is: -
ANSWER-SHA-2

A set of cryptographic hash functions designed by the National Security Agency (NS). -
ANSWER-SHA-2 (Secure Hash Algorithm

, Inactive user accounts should be either removed or disabled within___ - ANSWER-90
days

True or False: Procedures must be developed to easily distinguish the difference
between onsite personnel and visitors. - ANSWER-True

When should access be revoked of recently terminated employees? - ANSWER-
immediately

True or False: A visitor with a badge may enter sensitive area unescorted. - ANSWER-
False, visitors must be escorted at all times.

Protection of keys used for encryption of cardholder data against disclosure must
include at least: (4 items) - ANSWER-*Access to keys is restricted to the fewest number
of custodians necessary
*Key-encrypting keys are at least as strong as the data-encrypting keys they protect
*Key encrypting keys are stored separately from data-encrypting keys
*Keys are stored securely in the fewest possible locations

Description of cryptographic architecture includes: - ANSWER-*Details of all algorithms,
protocols, and keys used for the protection of cardholder data, including key strength
and expiry date
*Description of the key usage for each key
*Inventory of any HSMs and other SCDs used for key management

What 2 methods must NOT be used to be disk-level encryption compliant - ANSWER-
*Cannot use the same user account authenticator as the operating system
*Cannot use a decryption key that is associated with or derived from the systems local
user account database or general network login credentials.

6 months - ANSWER-DESV User accounts and access privileges are reviewed at least
every______

Track 1 (Length up to 79 characters) - ANSWER-Contains all fields of both Track 1 and
Track 2

Track 2 (Length up to 40 characters) - ANSWER-Provides shorter processing time for
older dial-up transmissions.

DESV - ANSWER-Designated Entities Supplemental Validation

DESV Requirements: - ANSWER-*Implementing a PCI DSS Compliance program
*Document and validate PCI DSS Scope
*Validate PCI DSS is incorporated into business-as-usual (BAU) activities
*Control and manage logical access to cardholder data environment
$7.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
eric13

Get to know the seller

Seller avatar
eric13 Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
2 year
Number of followers
1
Documents
85
Last sold
5 months ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions