Answers |Latest Version |Already Graded A+
Cardholder data ✔Correct Answer-Primary Account Number (PAN)
Cardholder name
Expiration date
Service Code
Sensitive Authentication Data ✔Correct Answer-Magnetic stripe data or equivalent on a chip
CAV2/CVC2/CVV2/CID
PINs / PIN Blocks
Network Segmentation is ✔Correct Answer-Recommended to reduce scope and risk
Sampling ✔Correct Answer-Sampling of Business Facilities / System components is allowed,
however all applicable PCI DSS requirements must be considered.
Compensating Controls ✔Correct Answer-a Compensating Controls Worksheet must be completed
for each compensating control. And documented in the ROC.
Merchant levels ✔Correct Answer-Defined by payment brands.
Levels 1 to 4
1 is the largets merchants or merchants who have been compromised. 6 Million transactions/year +
Non-compliance consequences ✔Correct Answer-Fines according to Level and elapsed time
determined by payment brands
Breach Consequences ✔Correct Answer-Fine per cardholder data compromised / Loss of
reputation / customer trust / suspension of service by credit card account provider
Firewall and Router rule sets be reviewed at least every ✔Correct Answer-6 Months
It is required to install all critical new security patches within ✔Correct Answer-1 Month
Public facing web applications are to be reviewed ✔Correct Answer-at least annually
Users are required to change passwords at least every ✔Correct Answer-90 Days
Users accounts are to be locked out after more than ________ invalid logon attempts ✔Correct
Answer-6
System/session idle time out features should be set to _______ or less ✔Correct Answer-15
Minutes
Visitor log for physical access should be retained for at least ✔Correct Answer-3 Months
Video Cameras/access control mechanisms should be stored for at least ✔Correct Answer-3
Months
, Back up media storage location should be reviewed at least ✔Correct Answer-Annually
Periodic media inventories are to be performed at least ✔Correct Answer-Annually
Audit logs should be retained for at least ✔Correct Answer-1 Year
Processes should be in place to immediately restore at least _______ audit logs for analysis
✔Correct Answer-3 months
Internal and external vulnerability scans are to be performed ✔Correct Answer-Quarterly
Penetration testing should be performed at least ✔Correct Answer-Annually
Tools are to be configured to perform critical file comparisons at least ✔Correct Answer-Weekly
Passwords length are required to be ✔Correct Answer-7 characters
Requirement 3 ✔Correct Answer-Protect stored cardholder data
Requirement 4 ✔Correct Answer-Encrypt transmission of cardholder data across open, public
networks
Requirement 5 ✔Correct Answer-Use and regularly update anti-virus software or programs
Requirement 6 ✔Correct Answer-Develop and maintain secure systems and applications
Requirement 7 ✔Correct Answer-Restrict access to cardholder data by business need to know
Requirement 8 ✔Correct Answer-Assign a unique ID to each person with computer access
Requirement 9 ✔Correct Answer-Restrict physical access to cardholder data
Requirement 10 ✔Correct Answer-Track and monitor all access to network resources and
cardholder data
Requirement 11 ✔Correct Answer-Regularly test security systems and processes
Requirement 12 ✔Correct Answer-Maintain a policy that addresses information security for all
personne
Remove or Disable inactive accounts over ✔Correct Answer-90 Days
How many characters are on Track 1 ✔Correct Answer-Up to 79
How many characters are on Track 2 ✔Correct Answer-Up to 40
QIR ✔Correct Answer-Qualified integrator and reseller
Entities that sell, install and or service payment applications on behalf of vendors.
PCI PTS ✔Correct Answer-Payment Card Industry PIN Transaction Security devices