100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

PCI - ISA Exam Flash Cards Questions and Answers 100% Accurate

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
31-10-2024
Written in
2024/2025

PCI - ISA Exam Flash Cards

Institution
Pci
Course
Pci









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Pci
Course
Pci

Document information

Uploaded on
October 31, 2024
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

PCI - ISA Exam Flash Cards

What makes up SAD? - answer- Track Data
- CAV2/CVC2/CVV2/CID)
- PINs & PIN Blocks

Track 1 - answer Contains all fields of both Track 1 and Track 2, up to 79 characters
long

11.2 Internal Scans - Frequency and performed by who? - answer Quarterly and after
significant changes in the network - Performed by qualified, internal or external,
resource

11.3 Penetration Tests (SERVICE PROVIDERS) - Frequency and performed by who? -
answer Every 6 months by a qualified, internal or external, resource

11.2 External Scans - Frequency and performed by who? - answer Quarterly and after
significant changes in the network - Performed by PCI SSC Approved Scanning Vendor
(ASV)

11.3 Penetration Tests - Frequency and performed by who? - answerAt least annually
and after significant changes in the network - Performed by qualified, internal or
external, resource

11.2 Review scan reports and verify scan process includes rescans until: - answer-
External scans: no vulnerabilities exists that scored 4.0 or higher by the CVSS
- Internal scans: all high-risk vulnerabilities as defined in PCI DSS requirement 6.1 are
resolved

Who decides if a ROC or SAQ is required? - answerPayment Brands / Acquirers

10.2 Implement audit trails for all system components to reconstruct the following
events: - answer- All individual accesses to CHD
- Actions taken by any individual with root or admin privileges
- Access to all audit trails
- Invalid logical access attempts
- Use of, and changes to, identification and authentication mechanisms
- Initialization, stopping, or pausing of the audit logs
- Creation and deleting of system-level objects

How long must QSA's retain work papers? - answer3 years, recommend the same for
ISAs

, Firewall and router rule sets must be reviewed every _____________________. -
answer6 months

Things to consider when assessing: - answerPeople, processes, technology

How often should an entity undergo a process to securely delete stored CHD that
exceeds defined retention requirements? - answerAt least quarterly

3.6 Key-management operations Dual Control vs Split Knowledge - answerDual
Control: At least two people are required to perform any key-management operations
and no one person has access to the authentication materials (e.g., passwords, keys) of
another

Split Knowledge: Key components are under the control of at least two people who only
have knowledge of their own key components

3.4 Pan is rendered unreadable in which ways? - answerHash, truncation, encrypt,
index token and pads

6.2 Critical Security patches should be installed
__________________________________. - answerWithin 1 month of release

6.2 Installation of applicable vendor-supplied security patches (non-critical) should be
installed: - answerWithin an appropriate time frame (e.g., 3 months)

6.4.5 Change control procedures must include the following - answer- Documentation of
impact
- Documented change approval by authorized parties
- Functionality testing to verify change does not adversely impact security of the system
- Back-out procedures

6.5 Developers must be trained in up-to-date secure coding techniques at least
________. - answerAnnually

6.6 For public-facing web applications, address new threats and vulnerabilities on an
ongoing basis and ensure these applications are protected against known attacks by
either of the following methods - answer- At least annually, and after any changes,
review via manual or automated application vulnerability assessment tools/methods
- Automated technical solution that detects and prevents web-based attacks
continuously

1.3.2 Examine firewall and router configurations to verify inbound traffic is: -
answerLimited to IP addresses within the DMZ

7.1.4 Select sample of user IDs and compare with documented approvals to verify: -
answer1) Documented approval exists for the assigned privileges

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
jw638729 Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
294
Member since
2 year
Number of followers
187
Documents
15833
Last sold
6 days ago
NURSING VIEW

In my shop you will find documents, package deals, nursing courses, assigments,flashcards and all revision materials .You are welcome

4.0

59 reviews

5
38
4
3
3
5
2
4
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions