QUESTIONS WITH ANSWERS GRADED A+
• What is masking?.
Answer: Masking is a method of concealing a segment of a primary account
number (PAN) when displayed or printed (for example, on paper receipts,
reports, or computer screens), and is used when there is no business need to
view the entire PAN.( applies to displaying of information and implies that
data can be accessed behind the scenes)
• Change-detection Mechanism Alert.
Answer: Alerts for unauthorized file modifications
• Track 2 (Length up to 40 characters.
Answer: Provides shorter processing time for older dial-up transmissions.
• Key Retirement.
Answer: When keys are weakened or compromised
• Non-disruptive ASV Solutions.
Answer: Scans must not cause system reboots or DNS interference
• An Entity sharing cardholder data with a service provider must.
Answer: have an established process for engaging service providers,
including proper due diligence prior to engagement.
• What is split knowledge?.
Answer: Split knowledge is a method in which two or more people
separately have key components, where each person knows only their own
key component, and the individual key components convey no knowledge of
other components or of the original cryptographic key.
• Sensitive Authentication Data.
Answer: Includes CVV, Full Track Data, PIN
• When does clearing occur.
, Answer: usually within one day
• When a PAN is displayed to an employee who does NOT need to see the
full PAN, the minimum digits to be mased are.
Answer: All digits between the first six and last four
• SHA-2.
Answer: National Security Agency's cryptographic hash functions
• Verify that storage location security is reviewed at least to confirm that
backup media storage is secure.
Answer: - annually
• PCI DSS states that PAN must be rendered unreadable when stored. Which
of the following may be used to meet this requirement.
Answer: Hashing the entire PAN using strong cryptography
• SAQ B-IP Definition.
Answer: Merchant using E2EE with PTS-approved devices over IP
• When assessing requirement 6.5, testing to verify secure coding techniques
are in place to address common coding vulnerabilities includes.
Answer: Reviewing software development policies and procedures
• Who is responsible for enforcing compliance?.
Answer: Payment Brands
• SAQ A-EP.
Answer: An online merchant with a payment page that accepts cardholder
data, but transmits the data to a PCI DSS compliant service provider
• How often should user passwords be changed.
Answer: Every 90 Day
• SAQ C-VT Definition.
Answer: Merchants manually entering transactions via virtual terminal
• PA-DSS Policy Exception.
Answer: Usage for documenting security breaches
, • SAQ C.
Answer: Merchants with payment application systems connected to the
internet, no electronic cardholder data storage
• SAQ B-ANSWER.
Answer: Merchants only-Imprint machines with no electronic cardholder
data storage and/or Standalone, dial-out terminals with no electronic
cardholder data storage
• Implement processes to detect the presence of Wireless Access Points
(WAP) both authorized and unauthorized points.
Answer: Quarterly
• Test for WAP(wireless access points) and detect_____.
Answer: -authorized and unauthorized access quarterly
• SAQ B Definition.
Answer: Merchants using imprint or dial-out terminals
• Split Knowledge.
Answer: Required for keys stored on production systems
• Strong Passwords for Brute Force.
Answer: True: Strong passwords mitigate attacks with complexity
• Data Purging.
Answer: Quarterly removal of unnecessary stored data
• DESV.
Answer: Designated Entities Supplemental Validation
• True or False: A visitor with a badge may enter sensitive area unescorted. -.
Answer: False, visitors must be escorted at all times.
• PAN Masking.
Answer: Masks digits between first six and last four
• Keyed Cryptographic Hash.
Answer: A hashing function that incorporates a randomly generated secret