100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

PCI ISA EXAM LATEST (100% REAL EXAM QUESTIONS AND CORRECT ANSWERS)

Beoordeling
-
Verkocht
-
Pagina's
10
Cijfer
A+
Geüpload op
21-02-2024
Geschreven in
2023/2024

For PCI DSS requirement 1, firewall and router rule sets need to be reviewed every _____________ months - ANSWER- 6 months Non-console administrator access to any web-based management interfaces must be encrypted with technology such as......... - ANSWER- HTTPS Requirements 2.2.2 and 2.2.3 cover the use of secure services, protocols and daemons. Which of the following is considered to be secure? - ANSWER- SSH, TLS, IPSEC, VPN Which of the following is considered "Sensitive Authentication Data"? - ANSWER- Card Verification Value (CAV2/CVC2/CVV2/CID), Full Track Data, PIN/PIN Block True or False: It is acceptable for merchants to store Sensitive Authentication after authorization as long as it is strongly encrypted? - ANSWER- False When a PAN is displayed to an employee who does NOT need to see the full PAN, the minimum digits to be masked are: - ANSWER- All digits between the first six and last four Which of the following is true regarding protection of PAN? - ANSWER- PAN must be rendered unreadable during transmission over public, wireless networks Which of the following may be used to render PAN unreadable in order to meet requirement 3.4? - ANSWER- Hashing the entire PAN using strong cryptography, truncation, index tokens and pads with pads being securely stored, strong cryptography with associated key-management processes and procedures True or False Manual clear-text key-management procedures specify processes for the use of keys that are stored on production systems, use of split knowledge and dual control is required. - ANSWER- True When assessing requirement 6.5, testing to verify secure coding techniques are in place to address common coding vulnerabilities includes: - ANSWER- Examine software development policies and procedures to verify that up-to-date training in secure coding techniques is required for developers at least annually, based on industry best practices and guidance One of the principles to be used when granting user access to systems in CDE is: - ANSWER- Least privilege An example of a "one-way" cryptographic function used to render data unreadable is: - ANSWER- SHA-2 A set of cryptographic hash functions designed by the National Security Agency (NS). - ANSWER- SHA-2 (Secure Hash Algorithm Inactive user accounts should be either removed or disabled within___ - ANSWER- 90 days True or False: Procedures must be developed to easily distinguish the difference between onsite personnel and visitors. - ANSWER- True When should access be revoked of recently terminated employees? - ANSWERimmediately True or False: A visitor with a badge may enter sensitive area unescorted. - ANSWER- False, visitors must be escorted at all times. Protection of keys used for encryption of cardholder data against disclosure must include at least: (4 items) - ANSWER- *Access to keys is restricted to the fewest number of custodians necessary *Key-encrypting keys are at least as strong as the data-encrypting keys they protect *Key encrypting keys are stored separately from data-encrypting keys *Keys are stored securely in the fewest possible locations Description of cryptographic architecture includes: - ANSWER- *Details of all algorithms, protocols, and keys used for the protection of cardholder data, including key strength and expiry date *Description of the key usage for each key *Inventory of any HSMs and other SCDs used for key management What 2 methods must NOT be used to be disk-level encryption compliant - ANSWER- *Cannot use the same user account authenticator as the operating system *Cannot use a decryption key that is associated with or derived from the systems local user account database or general network login credentials. 6 months - ANSWER- DESV User accounts and access privileges are reviewed at least every______ Track 1 (Length up to 79 characters) - ANSWER- Contains all fields of both Track 1 and Track 2 Track 2 (Length up to 40 characters) - ANSWER- Provides shorter processing time for older dial-up transmissions. DESV - ANSWER- Designated Entities Supplemental Validation DESV Requirements: - ANSWER- *Implementing a PCI DSS Compliance program *Document and validate PCI DSS Scope *Validate PCI DSS is incorporated into business-as-usual (BAU) activities *Control and manage logical access to cardholder data environment *Identify and respond to suspicious events Who could DESV requirements apply to? - ANSWER- Those that have suffered significant or repeated breaches of cardholder data. PCI DSS requirements apply to_____ - ANSWER- people, processes, and technologies When planning for an assessment what 4 activities should be included during planning? - ANSWER- *List of people to be interviewed, system components used, documentation (training, payment logs), facilities (physical security) *Ensure assessor is familiar with technologies in assessment *If sampling, verify sample section and size is representative of the entire population *Identify the roles and the individuals within each role to be interviewed as part of the assessment What pre-assessment activities should an assessor consider when preparing for an assessment? - ANSWER- *Ensure assessor(s) has competent knowledge of the technologies being assessed *Identify types of system components and locations of facilities to be reviewed *Consider size and complexity of the environment to be assessed. When does authorization occur - ANSWER- At time of purchase When does clearing occur - ANSWER- usually within one day When does settlement occur - ANSWER- Usually within 2 days Where does an assessor document their sampling methodology? - ANSWE

Meer zien Lees minder
Instelling
PCI - Professional Certified Investigator
Vak
PCI - Professional Certified Investigator









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
PCI - Professional Certified Investigator
Vak
PCI - Professional Certified Investigator

Documentinformatie

Geüpload op
21 februari 2024
Aantal pagina's
10
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€9,31
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
TheHomeworkGuy

Maak kennis met de verkoper

Seller avatar
TheHomeworkGuy Southern New Hampshire University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
10
Lid sinds
2 jaar
Aantal volgers
7
Documenten
219
Laatst verkocht
7 maanden geleden
Top Quality Exam Answers

Top Quality Exam Answers

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen