COLLECTION RISK MANAGEMENT AND
COMPLIANCE MODULE SOLVED ITEMS AND
RESPONSE KEY
◉ SHA-2. Answer: National Security Agency's cryptographic hash
functions
◉ Visitor Access. Answer: Visitors must be escorted in sensitive
areas
◉ Key Protection. Answer: Restrictions on key access and storage
◉ Cryptographic Architecture Description. Answer: Details of
algorithms, keys, and HSMs used
◉ DESV Requirements. Answer: PCI DSS Compliance program
implementation
◉ Track 1 Data. Answer: Contains all fields of Track 1 and 2
, ◉ Track 2 Data. Answer: Provides faster processing for dial-up
transmissions
◉ DESV. Answer: Designated Entities Supplemental Validation
◉ Pre-Assessment Activities. Answer: Assessor's preparation for
assessment
◉ Authorization. Answer: Occurs at the time of purchase
◉ Clearing. Answer: Usually occurs within one day
◉ Settlement. Answer: Typically occurs within two days
◉ Dual Control. Answer: Multiple people required for key operations
◉ Key Retirement. Answer: When keys are weakened or
compromised
◉ Masking. Answer: Displaying data while keeping it accessible
◉ Truncation. Answer: Irrecoverable transformation of stored data