100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

PCI ISA Flashcards 3.2.1 Exam Q’s and A’s

Beoordeling
-
Verkocht
-
Pagina's
8
Cijfer
A+
Geüpload op
25-11-2025
Geschreven in
2025/2026

PCI ISA Flashcards 3.2.1 Exam Q’s and A’s

Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Studie
Vak

Documentinformatie

Geüpload op
25 november 2025
Aantal pagina's
8
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

PCI ISA Flashcards 3.2.1 Exam Q’s and A’s
Non-console administrator access to any web-based management interfaces must be
encrypted with technology such as......... - -HTTPS

-Requirements 2.2.2 and 2.2.3 cover the use of secure services, protocols and daemons.
Which of the following is considered to be secure? - -SSH

-Which of the following is considered "Sensitive Authentication Data"? - -Card Verification
Value (CAV2/CVC2/CVV2/CID), Full Track Data, PIN/PIN Block

-True or False: It is acceptable for merchants to store Sensitive Authentication after
authorization as long as it is strongly encrypted? - -False

-When a PAN is displayed to an employee who does NOT need to see the full PAN, the
minimum digits to be masked are: - -All digits between the first six and last four

-Which of the following is true regarding protection of PAN? - -PAN must be rendered
unreadable during transmission over public, wireless networks

-Which of the following may be used to render PAN unreadable in order to meet
requirement 3.4? - -Hashing the entire PAN using strong cryptography

-True or False Where keys are stored on production systems, split knowledge and dual
control is required? - -True

-When assessing requirement 6.5, testing to verify secure coding techniques are in place to
address common coding vulnerabilities includes: - -Reviewing software development
policies and procedures

-One of the principles to be used when granting user access to systems in CDE is: - -Least
privilege

-An example of a "one-way" cryptographic function used to render data unreadable is: - -
SHA-2

-A set of cryptographic hash functions designed by the National Security Agency (NS). - -
SHA-2 (Secure Hash Algorithm

-True or False: Procedures must be developed to easily distinguish the difference between
onsite personnel and visitors. - -True

-When should access be revoked of recently terminated employees? - -immediately

, -True or False: A visitor with a badge may enter sensitive area unescorted. - -False,
visitors must be escorted at all times.

-Protection of keys used for encryption of cardholder data against disclosure must include
at least: (4 items) - -*Access to keys is restricted to the fewest number of custodians
necessary
*Key-encrypting keys are at least as strong as the data-encrypting keys they protect
*Key encrypting keys are stored separately from data-encrypting keys
*Keys are stored securely in the fewest possible locations

-Description of cryptographic architecture includes: - -*Details of all algorithms, protocols,
and keys used for the protection of cardholder data, including key strength and expiry date
*Description of the key usage for each key
*Inventory of any HSMs and other SCDs used for key management

-What 2 methods must NOT be used to be disk-level encryption compliant - -*Cannot use
the same user account authenticator as the operating system
*Cannot use a decryption key that is associated with or derived from the systems local user
account database or general network login credentials.

-6 months - -DESV User accounts and access privileges are reviewed at least every______

-Track 1 (Length up to 79 characters) - -Contains all fields of both Track 1 and Track 2

-Track 2 (Length up to 40 characters) - -Provides shorter processing time for older dial-up
transmissions.

-DESV - -Designated Entities Supplemental Validation

-DESV Requirements: - -*Implementing a PCI DSS Compliance program
*Document and validate PCI DSS Scope
*Validate PCI DSS is incorporated into business-as-usual (BAU) activities
*Control and manage logical access to cardholder data environment
*Identify and respond to suspicious events

-Who could DESV requirements apply to? - -Those that have suffered significant or
repeated breaches of cardholder data.

-PCI DSS requirements apply to_____ - -people, processes, and technologies

-When planning for an assessment what 4 activities should be included during planning? -
-*List of people to be interviewed, system components used, documentation (training,
payment logs), facilities (physical security)
*Ensure assessor is familiar with technologies in assessment
*If sampling, verify sample section and size is representative of the entire population

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Bravoscores American InterContinental University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
124
Lid sinds
2 jaar
Aantal volgers
50
Documenten
9554
Laatst verkocht
2 weken geleden

4,0

32 beoordelingen

5
17
4
6
3
4
2
2
1
3

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen