qsa Flashcards

1
Q

developers attend secure coding class 6.5

A

1 year - anually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

characters for a password

A

7 characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

lock out attempts 8.1

A

6 attempts then locked out for 30 min or administrator unlocks it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

idle timeout 8.1

A

15 minutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Log Reviews, Security Events, Critical System Security Patches 10.1

A

Check Every Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Service Provider

A

Processing, Storage, or transmission of cardholder data on behalf on another entity. I managed firewall company or something along those line can be one too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

scoping

A

trust buy verify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 types of evidence when scoping

A

Documentation - Policy Procedures, Interviews, Observations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

pci dss 6 things

A
  1. build and maintain secure network
  2. protect cardholder data
  3. maintain a vulnerability management program
  4. implement strong access control measures.
  5. regularly monitor and test network
  6. maintain an infosec policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

review firewall rules 1.1

A

every 6 months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

data retention policy

A

limit data storage to minimums which is required for legal, regulatory or biz requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

install critical security patches 6.2

A

critical patches within 1 month other patches within an appropriate time frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

custom code changes 6.3.2

A

reviewed by individuals other than the author according to secure coding guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

vulnerability assesments of public facing websites 6.6

A

every year or if there is a change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

users terminated in the past 6 months 8.1

A

verify id’s have been deactivated or removed & physical auth methods removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

inactive accounts 8.1

A

disable within 90 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

audit trail 10.7

A

3 months online and 1 year retention

18
Q

Vulnerability Scans 11.2

A

quarterly or if significant change

19
Q

penetration scans 11.3

A

annually or if there is significant change

20
Q

risk assessment 12.2

A

at least annually or significant change

21
Q

information security policy 12.2

A

reviewed annually or significant change

22
Q

camera data 9.11

A

3 months

23
Q

media inventories 9.7.1

A

anually

24
Q

SAQ A

A

intended for merchants that accept only card-not-present transactions (that is, e-commerce, mail order or telephone order), and that outsource all their cardholder data functions to PCI DSS compliant service providers. For e-commerce merchants, this means that all elements of the payment page (or payment pages) that are delivered to the consumer’s browser must originate only and directly from a PCI DSS validated third-party service provider. SAQ A is not applicable to face-to-face payment channels.

25
Q

SAQ A-EP

A

developed for e-commerce merchants with a website that does not itself receive cardholder data, but that directly affects the security of the payment transaction. To be eligible for this SAQ, each element of every payment page delivered to the consumer’s browser must originate from either the merchant’s website or from a PCI DSS validated service provider.

26
Q

SAQ B

A

merchants who process cardholder data using only imprint machines or using only dial-out terminals.

27
Q

SAQ B-IP

A

developed for merchants who process cardholder data only via standalone, PTS-approved point-of-interaction devices that have an IP connection to the payment processor. To be eligible for this SAQ, the payment terminal must be listed on the PCI SSC website as an approved device. Merchants using the Secure Card Reader (SCR) category of devices are not eligible for SAQ B-IP.

28
Q

SAQ C

A

merchants with dedicated payment application systems segmented from all other systems, and connected to the Internet for the purposes of transaction processing. SAQ C is not applicable to e-commerce payment channels

29
Q

SAQ C-VT

A

for merchants using only web-based virtual payment terminals, where cardholder data is manually entered into a secure website from a single system.

30
Q

SAQ-D

A

all other SAQ-eligible merchants that do not fall into any of the other SAQ categories, and for any service providers defined by a payment brand as eligible to complete the SAQ.

Service providers only use this one if they do a SAQ

31
Q

SAQ-P2PE

A

merchants using a validated P2PE solution that is listed on the PCI SSC website.

32
Q

minimum password age

A

1 day

33
Q

change password

A

90 days

34
Q

track data

A

79 character limit track 1 - format code seperator PAN suffix sirname service code cvv cvc reserved for card issuers
40 track 2 PAN

35
Q

Typical Location of Track Data

A

Database files, Flat Files, Log files, debug files

36
Q

Systems that commonly store track data

A

POS systems. POS servers. Authorization Servers

37
Q

Typical location of card verification value or code

A

Paper, Databases, Log Files, Flat files, Debug files.

38
Q

Systems that commonly store card verification value or code data

A

Authorization servers. Web Servers. Kiosk

39
Q

maximum masked characters in PAN

A

first 6 last 4

40
Q

MOD-10 (The Luhn Formula)

A

Step 1: Double the value of alternate digits of the primary account number beginning with the second digit from the right. For any Resulting value >=10, subtract 9.
Step 2: Add calculated values as well as the values skipped in Step 1 together.
Step 3: The total obtained in Step 2 must be divisible by 10.