Non-console administrator access to any web-based management interfaces must be
encrypted with technology such as......... – answer HTTPS
Requirements 2.2.2 and 2.2.3 cover the use of secure services, protocols and
daemons. Which of the following is considered to be secure? – answer SSH
Which of the following is consider "Sensitive Authentication Data" - answer Card
Verification Value (CAV2/CVC2/CVV2/CID), Full Track Data,
PIN/PIN Block
True or False: It is acceptable for merchants to store Sensitive Authentication after
authorization as long as it is strongly encrypted? - answer False
When a PAN is displayed to an employee who does NOT need to see the full PAN, the
minimum digits to be mased are - answer All digits between the first six and last four
Which of the following is true regarding protection of PAN? - answerPAN must be
rendered unreadable during transmission over public, wireless networks
Which of the following may be used to render PAN unreadable in order to meet
requirement 3.4 - answerHashing the entire PAN using strong cryptography
True or False Where keys are stored on production systems, split knowledge and
dual control is required? - answerTrue
When assessing requirement 6.5, testing to verify secure coding techniques are in place
to address common coding vulnerabilities includes - answerReviewing software
development policies and procedures
One of the principles to be used when granting user access to systems in CDE is: - -
answerLeast privilege
An example of a "one-way" cryptographic function used to render data unreadable -
answerSHA-2
Keyed Cryptographic Hash - answerA hashing function that incorporates a randomly
generated secret key to provide brute force attack resistance and secret authentication
integrity
, Appropriate keyed cryptographic hashing algorithms include but are not limited to: -
answerHMAC, CMAC, and GMAC, with an effective cryptographic strength of at least
128-bits (NIST SP 800-131Ar2).
A set of cryptographic hash functions designed by the National Security Agency -
answer
True or False: Procedures must be developed to easily distinguish the difference
between onsite personnel and visitors. - answerTrue
When should access be revoked for recently terminated employees? -
answerimmediately
True or False: A visitor with a badge may enter sensitive area unescorted. - -
answerFalse, visitors must be escorted at all times.
Protection of keys used for encryption of cardholder data against disclosure must
include at least: (4 items) - answer*Access to keys is restricted to the fewest
number of custodians necessary
*Key-encrypting keys are at least as strong as the data-encrypting keys they protect
*Key encrypting keys are stored separately from data-encrypting keys
*Keys are stored securely in the fewest possible locations
Description of cryptographic architecture includes - answerDetails of all
algorithms, protocols, and keys used for the protection of cardholder data,
including key strength and expiry date
*Description of the key usage for each key
*Inventory of any HSMs and other SCDs used for key management
What 2 methods must NOT be used to be disk-level encryption compliant -
answer1.*Cannot use the same user account authenticator as the operating
system
2.*Cannot use a decryption key that is associated with or derived from the system's
local user account database or general network login credentials.
DESV User accounts and access privileges are reviewed at
least every - answer6 months
Track 1 (Length up to 79 characters) - answer- Contains all fields of both Track
1 and Track 2
Track 2 (Length up to 40 characters - answerProvides shorter processing time
for older dial-up transmissions.
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller jw638729. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.