100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

PCI ISA Flashcards 3.2.1 Exam Question & Answers 2025.docx

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
30-11-2025
Written in
2025/2026

PCI ISA Flashcards 3.2.1 Exam Question & Answers

Institution
PCI ISA Flashcards 3.2.1 Exa Questio & Answer 2
Course
PCI ISA Flashcards 3.2.1 Exa Questio & Answer 2










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
PCI ISA Flashcards 3.2.1 Exa Questio & Answer 2
Course
PCI ISA Flashcards 3.2.1 Exa Questio & Answer 2

Document information

Uploaded on
November 30, 2025
Number of pages
20
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

PCI ISA Flashcards 3.2.1 Exam
Question & Answers 2025
Non-console administrator access to any web-based
management interfaces must be encrypted with
technology such as......... - CORRECT ANSWERS
✔✔HTTPS


Requirements 2.2.2 and 2.2.3 cover the use of secure
services, protocols and daemons. Which of the following
is considered to be secure? - CORRECT ANSWERS
✔✔SSH


Which of the following is considered "Sensitive
Authentication Data"? - CORRECT ANSWERS ✔✔Card
Verification Value (CAV2/CVC2/CVV2/CID), Full Track Data,
PIN/PIN Block


True or False: It is acceptable for merchants to store
Sensitive Authentication after authorization as long as it
is strongly encrypted? - CORRECT ANSWERS ✔✔False


When a PAN is displayed to an employee who does NOT
need to see the full PAN, the minimum digits to be
masked are: - CORRECT ANSWERS ✔✔All digits
between the first six and last four

,PCI ISA Flashcards 3.2.1 Exam
Question & Answers 2025
Which of the following is true regarding protection of
PAN? - CORRECT ANSWERS ✔✔PAN must be
rendered unreadable during transmission over public,
wireless networks


Which of the following may be used to render PAN
unreadable in order to meet requirement 3.4? -
CORRECT ANSWERS ✔✔Hashing the entire PAN using
strong cryptography


True or False Where keys are stored on production
systems, split knowledge and dual control is required? -
CORRECT ANSWERS ✔✔True


When assessing requirement 6.5, testing to verify secure
coding techniques are in place to address common coding
vulnerabilities includes: - CORRECT ANSWERS
✔✔Reviewing software development policies and
procedures


One of the principles to be used when granting user
access to systems in CDE is: - CORRECT ANSWERS
✔✔Least privilege

, PCI ISA Flashcards 3.2.1 Exam
Question & Answers 2025
An example of a "one-way" cryptographic function used
to render data unreadable is: - CORRECT ANSWERS
✔✔SHA-2


A set of cryptographic hash functions designed by the
National Security Agency (NS). - CORRECT ANSWERS
✔✔SHA-2 (Secure Hash Algorithm


True or False: Procedures must be developed to easily
distinguish the difference between onsite personnel and
visitors. - CORRECT ANSWERS ✔✔True


When should access be revoked of recently terminated
employees? - CORRECT ANSWERS ✔✔immediately


True or False: A visitor with a badge may enter sensitive
area unescorted. - CORRECT ANSWERS ✔✔False,
visitors must be escorted at all times.


Protection of keys used for encryption of cardholder data
against disclosure must include at least: (4 items) -
CORRECT ANSWERS ✔✔*Access to keys is restricted
to the fewest number of custodians necessary

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NatashaKate Florida A&M University
View profile
Follow You need to be logged in order to follow users or courses
Sold
16
Member since
1 year
Number of followers
0
Documents
2584
Last sold
4 weeks ago
Natashakate

1.0

1 reviews

5
0
4
0
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions