WITH ANSWERS GRADED A+
◉ What is the primary factor for cardholder data? Answer: Primary
Account Number (PAN)
◉ Who develops PCI Standards? Answer: Security Standards Counsel
(SSC)
◉ Who enforces compliance programs? Answer: Participating Payment
Brands using SAQ or RoC
◉ What is require for a Attestation of Compliance. Answer: Entity
signiture with SAQ, QSA with RoC and ASV are not always required
◉ What is a QSA always required to use for an assessment? Answer:
RoC specifically the templet from PCI SSC
◉ First step of PCI DSS Assessment is? Answer: Assessed entity to
accurately determine the SCOPE of the review and the assessed entity
has to confirm the accuracy by identifying all locations of CHD. This
includes backup and failover systems. QSA still has to confirm if the
scope is correct.. Scoping is confirmed Annually.
,◉ When do you use customized approach vs compensating controls?
Answer: Customized approach best when an entity wants to use more
advance tech such as UEBA AI for thread hunting vs compensating is
when the entity is unable to meet the requirements bc of legacy tech or
some kind of restriction that requires alt approach to mitigating the risk.
Customized approach requires much more planning and advance
documentation, is intended for risk mature entities.
◉ Bespoke Software Vs Custom Software. Answer: Bespoke generally
is developed by a third party, custom usually is internally developed.
◉ Ransomeware is what type of attack? Answer: Malware
◉ Skimming (2 Types) - Also call Magecarting. Answer: Online
Skimming - Packet sniffing to capture live transitions.
Physical Skimming - Attachments to PoS devices to collect credit card
account data.
◉ Two primary methods of security user payment data. Answer: User
access controls and Cryptography
◉ Sensitive Authentication Data. Answer: Magnetic stripe, Chip, Card
Verification Code (3 digit on the back) and PINs for debt cards.
,◉ Payment Transaction Players. Answer: Cardholder - Buyer
Merchant - Seller
Acquirer - Merchant's bank, sends transaction data via Payment brand
network to issuer
Payment brand network - Facilities the transaction between acquirer
(think entity the Acquires the $) and Issue (think issues $ )
Issuer - Cardholders bank
◉ Payment processing. Answer: Authorization -> Clearing -> Settlement
◉ What are the 5 tasks that the PCI SSC do? Answer: Enhance payment
security via:
1. Technical security standards
2. Validation Resources for professionals and products
3. Train and qualification
4/ Security Guidance
5. Stakeholder Engagement
◉ Who usually asks for PCI Compliance, also know as the Compliance-
Accepting Entity. Answer: Acquirers (Entity's bank) and Brands
◉ What is the 4 standards developed and maintained by the PCI SSC.
Answer: PCI DSS, PTS, P2PE, Secure Software Standard
, ◉ What Entities are applicable for PCI DSS. Answer: Entities that store,
transmit or process CHD
◉ Who is responsible for making sure entities comply with PCI DSS.
Answer: Payment Brand Entities, not the SSC.
◉ When is PAN okay to not be encrypted? Answer: While in a non-
persistent state such as RAM or volatile memory
◉ Appendix A1. Answer: Co-lo / data center/ cloud additional
requirements
◉ Appendix D. Answer: Customized Approach additional requirement
that explains the required risk analysis
◉ Assessment Process. Answer: Scope, Assess, Report, Attest, Submit
◉ 3 Assessment activities for QSA. Answer: Examine (Screenshots),
Observe and Interview
◉ QIR. Answer: Qualified Integrator and Reseller - Installer of payment
systems