100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

PCI ISA Flashcards 3.2.1 Exam Q’s and A’s

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
25-11-2025
Written in
2025/2026

PCI ISA Flashcards 3.2.1 Exam Q’s and A’s

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
November 25, 2025
Number of pages
8
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

PCI ISA Flashcards 3.2.1 Exam Q’s and A’s
Non-console administrator access to any web-based management interfaces must be
encrypted with technology such as......... - -HTTPS

-Requirements 2.2.2 and 2.2.3 cover the use of secure services, protocols and daemons.
Which of the following is considered to be secure? - -SSH

-Which of the following is considered "Sensitive Authentication Data"? - -Card Verification
Value (CAV2/CVC2/CVV2/CID), Full Track Data, PIN/PIN Block

-True or False: It is acceptable for merchants to store Sensitive Authentication after
authorization as long as it is strongly encrypted? - -False

-When a PAN is displayed to an employee who does NOT need to see the full PAN, the
minimum digits to be masked are: - -All digits between the first six and last four

-Which of the following is true regarding protection of PAN? - -PAN must be rendered
unreadable during transmission over public, wireless networks

-Which of the following may be used to render PAN unreadable in order to meet
requirement 3.4? - -Hashing the entire PAN using strong cryptography

-True or False Where keys are stored on production systems, split knowledge and dual
control is required? - -True

-When assessing requirement 6.5, testing to verify secure coding techniques are in place to
address common coding vulnerabilities includes: - -Reviewing software development
policies and procedures

-One of the principles to be used when granting user access to systems in CDE is: - -Least
privilege

-An example of a "one-way" cryptographic function used to render data unreadable is: - -
SHA-2

-A set of cryptographic hash functions designed by the National Security Agency (NS). - -
SHA-2 (Secure Hash Algorithm

-True or False: Procedures must be developed to easily distinguish the difference between
onsite personnel and visitors. - -True

-When should access be revoked of recently terminated employees? - -immediately

, -True or False: A visitor with a badge may enter sensitive area unescorted. - -False,
visitors must be escorted at all times.

-Protection of keys used for encryption of cardholder data against disclosure must include
at least: (4 items) - -*Access to keys is restricted to the fewest number of custodians
necessary
*Key-encrypting keys are at least as strong as the data-encrypting keys they protect
*Key encrypting keys are stored separately from data-encrypting keys
*Keys are stored securely in the fewest possible locations

-Description of cryptographic architecture includes: - -*Details of all algorithms, protocols,
and keys used for the protection of cardholder data, including key strength and expiry date
*Description of the key usage for each key
*Inventory of any HSMs and other SCDs used for key management

-What 2 methods must NOT be used to be disk-level encryption compliant - -*Cannot use
the same user account authenticator as the operating system
*Cannot use a decryption key that is associated with or derived from the systems local user
account database or general network login credentials.

-6 months - -DESV User accounts and access privileges are reviewed at least every______

-Track 1 (Length up to 79 characters) - -Contains all fields of both Track 1 and Track 2

-Track 2 (Length up to 40 characters) - -Provides shorter processing time for older dial-up
transmissions.

-DESV - -Designated Entities Supplemental Validation

-DESV Requirements: - -*Implementing a PCI DSS Compliance program
*Document and validate PCI DSS Scope
*Validate PCI DSS is incorporated into business-as-usual (BAU) activities
*Control and manage logical access to cardholder data environment
*Identify and respond to suspicious events

-Who could DESV requirements apply to? - -Those that have suffered significant or
repeated breaches of cardholder data.

-PCI DSS requirements apply to_____ - -people, processes, and technologies

-When planning for an assessment what 4 activities should be included during planning? -
-*List of people to be interviewed, system components used, documentation (training,
payment logs), facilities (physical security)
*Ensure assessor is familiar with technologies in assessment
*If sampling, verify sample section and size is representative of the entire population

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Bravoscores American InterContinental University
Follow You need to be logged in order to follow users or courses
Sold
122
Member since
2 year
Number of followers
50
Documents
9536
Last sold
1 week ago

4,0

32 reviews

5
17
4
6
3
4
2
2
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions