100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
PCI version 4.0 ISA questions Verified 2024 $12.49   Add to cart

Exam (elaborations)

PCI version 4.0 ISA questions Verified 2024

 5 views  0 purchase
  • Course
  • Pci
  • Institution
  • Pci

PCI version 4.0 ISA questions

Preview 2 out of 8  pages

  • October 31, 2024
  • 8
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Pci
  • Pci
avatar-seller
jw638729
PCI version 4.0 ISA questions

Non-console administrator access to any web-based management interfaces must be
encrypted with technology such as......... – answer HTTPS

Requirements 2.2.2 and 2.2.3 cover the use of secure services, protocols and
daemons. Which of the following is considered to be secure? – answer SSH

Which of the following is consider "Sensitive Authentication Data" - answer Card
Verification Value (CAV2/CVC2/CVV2/CID), Full Track Data,
PIN/PIN Block

True or False: It is acceptable for merchants to store Sensitive Authentication after
authorization as long as it is strongly encrypted? - answer False

When a PAN is displayed to an employee who does NOT need to see the full PAN, the
minimum digits to be mased are - answer All digits between the first six and last four

Which of the following is true regarding protection of PAN? - answerPAN must be
rendered unreadable during transmission over public, wireless networks

Which of the following may be used to render PAN unreadable in order to meet
requirement 3.4 - answerHashing the entire PAN using strong cryptography

True or False Where keys are stored on production systems, split knowledge and
dual control is required? - answerTrue

When assessing requirement 6.5, testing to verify secure coding techniques are in place
to address common coding vulnerabilities includes - answerReviewing software
development policies and procedures

One of the principles to be used when granting user access to systems in CDE is: - -
answerLeast privilege

An example of a "one-way" cryptographic function used to render data unreadable -
answerSHA-2

Keyed Cryptographic Hash - answerA hashing function that incorporates a randomly
generated secret key to provide brute force attack resistance and secret authentication
integrity

, Appropriate keyed cryptographic hashing algorithms include but are not limited to: -
answerHMAC, CMAC, and GMAC, with an effective cryptographic strength of at least
128-bits (NIST SP 800-131Ar2).

A set of cryptographic hash functions designed by the National Security Agency -
answer

True or False: Procedures must be developed to easily distinguish the difference
between onsite personnel and visitors. - answerTrue

When should access be revoked for recently terminated employees? -
answerimmediately

True or False: A visitor with a badge may enter sensitive area unescorted. - -
answerFalse, visitors must be escorted at all times.

Protection of keys used for encryption of cardholder data against disclosure must
include at least: (4 items) - answer*Access to keys is restricted to the fewest
number of custodians necessary
*Key-encrypting keys are at least as strong as the data-encrypting keys they protect
*Key encrypting keys are stored separately from data-encrypting keys
*Keys are stored securely in the fewest possible locations

Description of cryptographic architecture includes - answerDetails of all
algorithms, protocols, and keys used for the protection of cardholder data,
including key strength and expiry date
*Description of the key usage for each key
*Inventory of any HSMs and other SCDs used for key management

What 2 methods must NOT be used to be disk-level encryption compliant -
answer1.*Cannot use the same user account authenticator as the operating
system
2.*Cannot use a decryption key that is associated with or derived from the system's
local user account database or general network login credentials.

DESV User accounts and access privileges are reviewed at
least every - answer6 months

Track 1 (Length up to 79 characters) - answer- Contains all fields of both Track
1 and Track 2

Track 2 (Length up to 40 characters - answerProvides shorter processing time
for older dial-up transmissions.

DESV - answerDesignated Entities Supplemental Validation

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller jw638729. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

80467 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart