Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

PCI ISA Exam Study Guide 100% Correct Answers Verified Latest 2024 Version

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
03-07-2024
Written in
2023/2024

PCI ISA Exam Study Guide | 100% Correct Answers | Verified | Latest 2024 Version Non-console administrator access to any web-based management interfaces must be encrypted with technology such as......... - HTTPS Requirements 2.2.2 and 2.2.3 cover the use of secure services, protocols and daemons. Which of the following is considered to be secure? - SSH Which of the following is considered "Sensitive Authentication Data"? - Card Verification Value (CAV2/CVC2/CVV2/CID), Full Track Data, PIN/PIN Block True or False: It is acceptable for merchants to store Sensitive Authentication after authorization as long as it is strongly encrypted? - False When a PAN is displayed to an employee who does NOT need to see the full PAN, the minimum digits to be masked are: - All digits between the first six and last four Which of the following is true regarding protection of PAN? - PAN must be rendered unreadable during transmission over public, wireless networks Which of the following may be used to render PAN unreadable in order to meet requirement 3.4? - Hashing the entire PAN using strong cryptography True or False Where keys are stored on production systems, split knowledge and dual control is required? - True When assessing requirement 6.5, testing to verify secure coding techniques are in place to address common coding vulnerabilities includes: - Reviewing software development policies and procedures One of the principles to be used when granting user access to systems in CDE is: - Least privilege

Show more Read less
Institution
Course

Content preview

PCI ISA Exam Study Guide | 100% Correct
Answers | Verified | Latest 2024 Version
Non-console administrator access to any web-based management interfaces must be encrypted with
technology such as......... - ✔✔HTTPS



Requirements 2.2.2 and 2.2.3 cover the use of secure services, protocols and daemons. Which of the
following is considered to be secure? - ✔✔SSH



Which of the following is considered "Sensitive Authentication Data"? - ✔✔Card Verification Value
(CAV2/CVC2/CVV2/CID), Full Track Data, PIN/PIN Block



True or False: It is acceptable for merchants to store Sensitive Authentication after authorization as long
as it is strongly encrypted? - ✔✔False



When a PAN is displayed to an employee who does NOT need to see the full PAN, the minimum digits to
be masked are: - ✔✔All digits between the first six and last four



Which of the following is true regarding protection of PAN? - ✔✔PAN must be rendered unreadable
during transmission over public, wireless networks



Which of the following may be used to render PAN unreadable in order to meet requirement 3.4? -
✔✔Hashing the entire PAN using strong cryptography



True or False Where keys are stored on production systems, split knowledge and dual control is
required? - ✔✔True



When assessing requirement 6.5, testing to verify secure coding techniques are in place to address
common coding vulnerabilities includes: - ✔✔Reviewing software development policies and procedures



One of the principles to be used when granting user access to systems in CDE is: - ✔✔Least privilege

, An example of a "one-way" cryptographic function used to render data unreadable is: - ✔✔SHA-2



A set of cryptographic hash functions designed by the National Security Agency (NS). - ✔✔SHA-2 (Secure
Hash Algorithm



True or False: Procedures must be developed to easily distinguish the difference between onsite
personnel and visitors. - ✔✔True



When should access be revoked of recently terminated employees? - ✔✔immediately



True or False: A visitor with a badge may enter sensitive area unescorted. - ✔✔False, visitors must be
escorted at all times.



Protection of keys used for encryption of cardholder data against disclosure must include at least: (4
items) - ✔✔*Access to keys is restricted to the fewest number of custodians necessary

*Key-encrypting keys are at least as strong as the data-encrypting keys they protect

*Key encrypting keys are stored separately from data-encrypting keys

*Keys are stored securely in the fewest possible locations



Description of cryptographic architecture includes: - ✔✔*Details of all algorithms, protocols, and keys
used for the protection of cardholder data, including key strength and expiry date

*Description of the key usage for each key

*Inventory of any HSMs and other SCDs used for key management



What 2 methods must NOT be used to be disk-level encryption compliant - ✔✔*Cannot use the same
user account authenticator as the operating system

*Cannot use a decryption key that is associated with or derived from the systems local user account
database or general network login credentials.



6 months - ✔✔DESV User accounts and access privileges are reviewed at least every______

Written for

Course

Document information

Uploaded on
July 3, 2024
Number of pages
10
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$8.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
hov
1.0
(2)

Get to know the seller

Seller avatar
hov State University Of West Georgia
Follow You need to be logged in order to follow users or courses
Sold
12
Member since
2 year
Number of followers
3
Documents
2125
Last sold
2 months ago
Academic Avengers

Expert Verified Exams {Latest Versions} 99% Pass Rate

1.0

2 reviews

5
0
4
0
3
0
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions