PCI ISA 3.2.1.pdf file:///C:/Users/HP/Desktop/TYPA%20NEW/PCI%20ISA%203.2.1
PCI ISA 3.2.1
1. For PCI DSS requirement 1, firewall and router rule sets need to be reviewedevery
months
ANS 6 months
2. Non-console administrator access to any web-based management inter-faces must
be encrypted with technology such as. ...........................................HTTPS
3. Requirements 2.2.2 and 2.2.3 cover the use of secure services, protocolsand
daemons. Which of the following is considered to be secure?
ANS SSH
4. Which of the following is considered "Sensitive Authentication Data"?
ANS CardVerification Value (CAV2/CVC2/CVV2/CID), Full Track Data, PIN/PIN Block
5. True or False
It is acceptable for merchants to store Sensitive Authentica-tion after authorization as
long as it is strongly encrypted?
ANS False
6. When a PAN is displayed to an employee who does NOT need to see the fullPAN, the
1/7
1 of 21 8/8/2024, 3:24
,PCI ISA 3.2.1.pdf file:///C:/Users/HP/Desktop/TYPA%20NEW/PCI%20ISA%203.2.1
minimum digits to be masked are
ANS
All digits between the first six and last four
7. Which of the following is true regarding protection of PAN?
ANS PAN must berendered unreadable during transmission over public, wireless networks
8. Which of the following may be used to render PAN unreadable in order tomeet
requirement 3.4?
ANS Hashing the entire PAN using strong cryptography
9. True or FalseWhere keys are stored on production systems, split knowledgeand dual
control is required?
ANS True
10. When assessing requirement 6.5, testing to verify secure coding tech- niques are in
place to address common coding vulnerabilities includes
ANS
Re-viewing software development policies and procedures
11. One of the principles to be used when granting user access to systems inCDE is
ANS
Least privilege
2/7
2 of 21 8/8/2024, 3:24
,PCI ISA 3.2.1.pdf file:///C:/Users/HP/Desktop/TYPA%20NEW/PCI%20ISA%203.2.1
12. An example of a "one-way" cryptographic function used to render dataunreadable
is
ANS
SHA-2
13. A set of cryptographic hash functions designed by the National SecurityAgency (NS).
ANS SHA-2 (Secure Hash Algorithm
14. Inactive user accounts should be either removed or disabled within
ANS 90days
15. True or False
ANS Procedures must be developed to easily distinguish thedifference between onsite
personnel and visitors.
ANS True
16. When should access be revoked of recently terminated employees?
ANS im-mediately
17. True or False
ANS A visitor with a badge may enter sensitive area unescorted.-
ANS False, visitors must be escorted at all times.
3/7
3 of 21 8/8/2024, 3:24
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller BESTGOODIES. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.