AND CORRECT ANSWERS
HTTPS - CORRECT ANSWER Encrypts non-console admin access to web-based
interfaces
SSH - CORRECT ANSWER Secure service, protocol, or daemon
Sensitive Authentication Data - CORRECT ANSWER Includes CVV, Full Track Data,
PIN
PAN Masking - CORRECT ANSWER Masks digits between first six and last four
PAN Protection - CORRECT ANSWER Must be unreadable during transmission over
networks
Hashing for PAN - CORRECT ANSWER Encrypts PAN using strong cryptography
Split Knowledge - CORRECT ANSWER Required for keys stored on production
systems
Least Privilege - CORRECT ANSWER Granting minimal user access in CDE
SHA-2 - CORRECT ANSWER National Security Agency's cryptographic hash
functions
Visitor Access - CORRECT ANSWER Visitors must be escorted in sensitive areas
Key Protection - CORRECT ANSWER Restrictions on key access and storage
, Cryptographic Architecture Description - CORRECT ANSWER Details of algorithms,
keys, and HSMs used
DESV Requirements - CORRECT ANSWER PCI DSS Compliance program
implementation
Track 1 Data - CORRECT ANSWER Contains all fields of Track 1 and 2
Track 2 Data - CORRECT ANSWER Provides faster processing for dial-up
transmissions
DESV - CORRECT ANSWER Designated Entities Supplemental Validation
Pre-Assessment Activities - CORRECT ANSWER Assessor's preparation for
assessment
Authorization - CORRECT ANSWER Occurs at the time of purchase
Clearing - CORRECT ANSWER Usually occurs within one day
Settlement - CORRECT ANSWER Typically occurs within two days
Dual Control - CORRECT ANSWER Multiple people required for key operations
Key Retirement - CORRECT ANSWER When keys are weakened or compromised
Masking - CORRECT ANSWER Displaying data while keeping it accessible
Truncation - CORRECT ANSWER Irrecoverable transformation of stored data