
















Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
An overview of the payment card industry data security standard (pci dss) and the various self-assessment questionnaires (saqs) that merchants can use to validate their compliance. It covers topics such as the scope of pci dss, the different saq types, the requirements for designated entities, methods for stealing payment card data, and the role of acquirers and payment brands. The document also discusses the pci point-to-point encryption (p2pe) standard, the use of virtualization technologies, and the requirements for protecting cardholder data, such as masking and hashing. Additionally, it covers pci dss requirements related to anti-virus software, access control, and wireless device testing. The information provided can be useful for merchants, service providers, and others involved in the payment card industry to understand the pci dss compliance process and requirements.
Typology: Exams
1 / 24
This page cannot be seen from the preview
Don't miss anything!
Which of the following does not belong? The following events should be included in automated audit trails for all system component:
How often should logs and security event reviews be conducted? - ✔✔At least daily (10.6) How long should audit trail history be retained? At least ___ of history must be immediately available for analysis. - ✔✔At least 1 year retained 3 months (10.7) How long should visitor logs for physical access be retained? - ✔✔At least 3 months (9.4) Critical patches need to installed within ___ of release. - ✔✔One month For public-facing web applications, which of the following is required?
Which SAQ applies to MERCHANTS that store any cardholder data, including legacy data? - ✔✔SAQ D Which SAQ applies to MERCHANTS that accept transactions through a PCI-listed P2PE solution? - ✔✔SAQ P2PE Which SAQ applies to MERCHANTS that accept e-commerce transactions only through a fully outsourced service provider? - ✔✔SAQ A Which SAQ applies to MERCHANTS that accept e-commerce transactions only through a fully outsourced service provider and payment processing is outsourced to PCI DSS validated service provider? - ✔✔SAQ A-EP Which SAQ applies to MERCHANTS that accept e-commerce transactions only through a fully outsourced service provider and payment processing is outsourced to PCI DSS validated service provider on systems managed by the merchant? - ✔✔SAQ D Because the system is managed by the merchant, it is a SAQ D Which SAQ applies to MERCHANTS that accept mail/telephone order (MOTO) transactions not protected by P2PE solution? - ✔✔SAQ A Which SAQ applies to MERCHANTS that accept MOTO or card-present transactions via imprint or dial-out machines (no internet)? - ✔✔SAQ B Which SAQ applies to MERCHANTS that accept MOTO or card-present transactions via PIN transaction system (PTS) approved devices (with internet)? - ✔✔SAQ B-IP Which SAQ applies to MERCHANTS that accept MOTO or card-present transactions via payment app on POS or PC (with internet)? - ✔✔SAQ C Which SAQ applies to MERCHANTS that accept MOTO or card-present transactions via merchant's web- browser sending to service provider's "virtual payment application?" - ✔✔SAQ C-VT
What determines if an organization requires additional validation to existing PCI DSS requirements aka DESV?
The P2PE Standard covers encryption, decryption, and key management requirements for point-to-point encryption solutions. The standard for validating off-the-shelf payment applications used in authorization and settlement is: a)PCI P2PE b)PA-DSS c)PCI PTS d)PCI DSS - ✔✔B PA-DSS PA-DSS is the standard used by PA-QSAs to validate payment applications. Merchants using PA-DSS validated payment applications are automatically PCI DSS compliant. (True or False) - ✔✔False - Using PA-DSS validated applications is not the only requirement for a merchant to meet to become PCI DSS compliant. Which of the below functions is associated with acquirers? a)Provide settlement services to a merchant b)Provide clearing services to a merchant c)Provide authorization services to a merchant d)All of the options - ✔✔D - All of the options Acquirers are involved in authorization, clearing and settlement for their merchants. Which of the following entities will ultimately approve a purchase? a)Issuer b)Payment Transaction Gateway c)Acquirer d)Merchant - ✔✔A-Issuer The issuer ultimately approves a purchase.
In which step does the payment brand network provide complete reconciliation to the merchant's bank? a)Approval b)Settlement c)Authorization d)Clearing - ✔✔D-Clearing During clearing, the processor provides complete reconciliation to the merchant's bank. A company that _________________ is considered to be a service provider. a)Is a founding member of PCI SSC b)Is a payment card brand c)Is not also a merchant d)Controls or could impact the security of another entity's cardholder data - ✔✔D- A company that controls or impacts the security of cardholder data is considered to be a service provider. Which of the following are examples of service providers?(choose all that apply) a)Data Center hosting providers b)ISOs c)Telecom providers (only communications link) d)Payment Gateways - ✔✔A, B, D Data Center Hosting providers, Payment Gateways, and Independent Sales Organizations (ISOs) or External Sales Agents (ESAs) are examples of Service Providers. Telecommunications providers who only provide communication links and who do not have access to the application layer of the communication are not considered Service Providers. Which of the following are parts of the Payment Brand role?(Select all that apply) a)Offer training for QSAs, PA-QSAs and ASVs b)Develop and enforce compliance programs
Which SAQ best applies to the following: Service provider using only web-based virtual terminals
Which SAQ best applies to the following: Merchant who is using a validated P2PE solution listed on the PCI SSC website.
a)Payment card brands b)Issuers c)Acquirers d)PCI SSC - ✔✔A-Payment card brands Payment brands are responsible for enforcing compliance. Which entity is responsible for forensic investigations of account data compromise? a)PCI SSC b)QSA/ISA c)Payment Brands d)QIR - ✔✔C-Payment Brands The payment brands are responsible for enforcement of compliance and forensic investigations of data breaches. Account data consists of __________ and __________ ?a)Cardholder Names, PANs b)Cardholder Data, Sensitive Authentication Data c)PANs, PINs d)Cardholder Data, PANs - ✔✔B Account Data consists of Cardholder Data and Sensitive Authentication Data. Storing track data is permitted when ______. a)it is reported to the PCI SSC annually in a ROC b)it is being stored by issuers with a business justification c)it is encrypted by the merchant storing it d)it is hashed by the merchant storing it - ✔✔B
Storing track data is permitted when it is being stored by issuers. When scoping an environment for PCI DSS, it is important to identify ___________.(select all that apply) a)Business facilities involved in processing transactions b)Components that store cardholder data c)Personnel with access to cardholder data d)All flows of cardholder data - ✔✔A, B, C, D People, processes and technology that store, process or transmit cardholder data are in scope, along with any connected systems. Systems that provide, or could affect the security of, in-scope systems are also in scope. Which of these devices can be used to provide network segmentation controls?(select all that apply) a)Routers b)Switches c)Firewalls d)File servers - ✔✔A, B, C File servers might be protected by firewalls, but do not provide the functionality needed to segment networks. If virtualization technologies are used in a cardholder data environment: a)The virtualization technologies are included in scope for PCI DSS b)The virtualization technologies are not in scope for PCI DSS c)Entities using virtualization technologies should complete SAQ C d)Virtualization technologies should not be used in the cardholder data environment - ✔✔A If virtualization technologies are used in the cardholder data environment, the virtualization technologies are included in scope for PCI DSS.
a)it is reported to the PCI SSC annually in a ROC b)it is being stored by issuers c)it is hashed by the merchant storing it d)it is encrypted by the merchant storing it - ✔✔B Storing track data "long-term" or "persistently" is permitted when it is being stored by issuers. PCI DSS Requirement 3.4 states that PAN must be rendered unreadable when stored. Which of the following may be used to meet this requirement? a)Hiding the column containing PAN data in the database b)Encryption of the first six and last four numbers of the PAN c)Hashing the entire PAN using strong cryptography d)Masking the entire PAN using industry standards - ✔✔C The entire PAN is hashed using strong cryptography to meet the PCI DSS Requirement 3.4 which states that PAN must be rendered unreadable when stored. PCI DSS Requirements 5 state that anti-virus software must be: a)Updated at least annually b)Installed on all systems, even those not commonly affected by malware c)Installed on systems commonly affected by malware d)Configured to allow users to disable it as desired - ✔✔C PCI DSS Requirement 5 states that anti-virus software must be installed on all systems commonly affected by malware. As defined by PCI DSS Requirement 7, access to cardholder data should be restricted based on which principle? a)Maximum privilege b)Number of personnel in the organization
c)Business need to know d)No access to cardholder data should be permitted - ✔✔C Per PCI DSS Requirement 7, access to cardholder data should be restricted based on business need-to- know. PCI DSS Requirement 12.6 requires personnel to acknowledge at least ___________ that they have read and understood the security policy and procedures. a)Once during their employment b)Every six months c)Quarterly d)Annually - ✔✔D PCI DSS Requirement 12.6 requires personnel to acknowledge at least annually that they have read and understood the security policy and procedures. Information Supplements provided by the PCI SSC may "supersede" or replace PCI DSS requirements. (True or False) - ✔✔False Information Supplements provided by the PCI SSC do not supersede or replace PCI DSS requirements. In order to be considered a compensating control, which of the following must exist: a)A documented business constraint. b)A legitimate technical constraint and a documented business constraint. c)A legitimate technical constraint. d)A legitimate technical constraint or a documented business constraint. - ✔✔D A legitimate technical constraint or a documented business constraint must exist to consider a compensating control.
a)Rlogin b)RConsole c)Telnet d)HTTPS - ✔✔D HTTPS can be used to encrypt non-console, web-based admin access to network components. Requirements 2.2.2 and 2.2.3 cover the use of secure services, protocols and daemons. Which of the follow is considered to be secure? a)Rlogin b)SSH c)Telnet d)FTP - ✔✔B SSH is an example of secure protocol. Which of the following is considered "Sensitive Authentication Data"? a)Card verification value b)Cardholder name c)Expiration Date d)PAN - ✔✔A Card verification value is considered "Sensitive Authentication Data." It is acceptable for merchants to store Sensitive Authentication after authorization as long as it is strongly encrypted. (True or False) - ✔✔False It is not acceptable for merchants to store Sensitive Authentication Data after authorization even if it is encrypted.
When a PAN is displayed to an employee who does NOT need to see the full PAN, the minimum digits to be masked are: a)The first six and last four digits b)All digits between the first six and last four c)Only the last four digits d)First four and last four digits - ✔✔B The digits that exist between the first 6 and the last 4 digits of the PAN should be "masked" or hidden for an employee who does NOT need to see full PAN. Which of the following is true regarding protection of PAN? a)PAN must be rendered unreadable during transmission over private, secure networks b)There are no PCI DSS requirements for rendering PAN unreadable c)PAN must be rendered unreadable during transmission over public, wireless networks d)PAN must be rendered unreadable when present in volatile memory during a transaction - ✔✔C PAN must be rendered unreadable during transmission over public, wireless networks. Which of the following may be used to render PAN unreadable in order to meet requirement 3.4? a)Hiding the column containing PAN data in the database b)Encryption of the first six and last four numbers of the PAN c)Hashing the entire PAN using strong cryptography d)Masking the entire PAN using industry standards - ✔✔C Requirement 3.4 may be met by hashing the entire PAN using strong cryptography. When assessing requirement 6.5, testing to verify secure coding techniques are in place to address common coding vulnerabilities includes: a)Interview firewall administrators to identify open ports and protocols b)Reviewing software development policies and procedures