QUESTIONS WITH CORRECT DETAILED
ANSWERS || 100% GUARANTEED PASS
<RECENT VERSION>
1. RFC 1918 - ANSWER ✔ the standard identified by the Internet Engineering
Task Force that defines the usage and appropriate address ranges for
privatenetworks
2. Risk Analysis/Risk Assessment - ANSWER ✔ process that identifies
valuable system resources and threats; quantifies loss exposures based on
estimated frequencies and costs of occurrence; and recommends how to
allocate resources to contermeasures so as to minimize total exposure
3. Risk Ranking - ANSWER ✔ a defined criterion of measurement based upon
the the risk assessment
4. SDLC - ANSWER ✔ phases of the development of software or computer
system that includes planning, analysis, design, testing, and implementation
5. Secure Coding - ANSWER ✔ The process of creating and implementing
applications that are resistant to tampering and/or compromise
6. Service Provider - ANSWER ✔ Business entity that is not a payment brand,
directly involved in the processing, storage, or transmission of cardholder
data on behalf of anther intity.
,7. SSH - ANSWER ✔ Protocol suite providing encryption for network services
like remote login or remote file transfer
8. Truncation - ANSWER ✔ method of rendering the full PAN unreadable by
permanently removing a segment of PAN data
9. SAQ A - ANSWER ✔ applies to card not present merchants who have
completely outsourced all cardholder data processing functions
10.SAQ A-EP - ANSWER ✔ applies to ecommoerce merchants who partially
outsource all payment processing to PCI DSS compliant service providers
11.SAQ B - ANSWER ✔ applies to merchants with no electronic cardholder
data storage and who process payments either by standalone terminals or
imprint-only machines.
12.SAQ B-IP - ANSWER ✔ used for merchants who process payments via
standalone PTS-approved point-of-interaction (POI) devices with an IP
connection to the payment processor.
13.SAQ C-VT - ANSWER ✔ developed for a specific environment and
contains some subtle differences toSAQ C. The VT stands for virtual
terminals and applies to externally hosted web payment solutions for
merchants with no electronic cardholder data storage.
14.SAQ C - ANSWER ✔ applies to merchants with a payment application
connected to the Internet and no electronic storage of cardholder data. It
normally applies to small merchants who have deployed out-of-the box
software to a standalone machine for taking individual payments.
,15.SAQ P2PE - ANSWER ✔ This new SAQ type has been introduced for
merchants who process card data only via payment terminals included in a
validated and PCI SSC-listed Point-to-Point Encryption (P2PE) solution.
16.SAQ D - ANSWER ✔ applies to any merchants who do not meet the criteria
for other SAQs, as well as all service providers.
17.CHD data can only be stored for how long? - ANSWER ✔ based on
merchant documented policy based on biz, regulatory, legal requirements
18.CHD that has exceeded its defined retention period must be deleted based on
a ________ process - ANSWER ✔ quarterly
19.When is it OK to store sensitive authentication date (SAD)? - ANSWER ✔
temporarily prior to authorization. Issuers can store SAD based on business
need
20.Sensitive Authentication Data - ANSWER ✔ Full Track, Track 1, Track 2,
CVV, PIN. Any equivalent from chip
21.When masking a card number what can be shown - ANSWER ✔ first 6 and
last 4
22.Acceptable methods for making PAN unreadable - ANSWER ✔ Hash,
Truncation, Tokenized, strong key cryptography
, 23.Secret/Private keys must be protected by what method(s) - ANSWER ✔ 1)
key-encrypting key, stored separately. 2) Hardware Security Module (HSM)
3) two full length key components (aka split knowledge)
24.Spit Knowledge - ANSWER ✔ two or more people separately have key
components; knowing only their half
25.List 3 or more open public networks - ANSWER ✔ Internet, wireless
networks (802.11 and Bluetooth), Cellular networks, Satellite networks
26.WEP - ANSWER ✔ Wired Equivalent Privacy - 802.11 encryption. Very
weak. Retired in 2004. Use WPA2+AES instead
27.Anitvirus must be installed on what systems - ANSWER ✔ Those
commonly affected by malware
28.Systems considered not commonly affected by malware must be reviewed
____________________ - ANSWER ✔ Periodically
29.CVSS - ANSWER ✔ Common Vulnerability Scoring System; Open
protocol for scoring new vulnerabilities.
30.Critical security patches must be installed how soon after their release -
ANSWER ✔ within one month
31.When can live PAN data be used for development and testing - ANSWER ✔
NEVER