Requirement 1-12 Flashcards

1
Q

Theme 1

A

Build and Maintain Secured Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Theme 2

A

Protect Cardholder Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Theme 3

A

Maintain a Vulnerability Management Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Theme 4

A

Implement Access Controls Measure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Theme 5

A

Regularly Monitor and Test Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Theme 6

A

Maintain Information Security Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Build and Maintain Secured Network (Theme 1)

A

Firewall Management (Req 1)
Vendor Defaults (Req 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protect Cardholder Data (Theme 2)

A

Data Protection (Req 3)
Data Transmission and Encryption (Req 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Maintain a Vulnerability Management Program (Theme 3)

A

Anti-virus Controls (Req 5)
Systems and Applications Security (Req 6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Implement Access Controls Measures

A

Data Access Controls (Req 7)
Personal Access Controls (Req 8)
Physical Access Controls (Req 9)
Data and Network Access Controls (Req 10)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Regularly Monitor and Test Network

A

Security Testing (Req 11)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Maintain Information Security Policies

A

Information Security Policies (Req 12)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Process of identifying all system components, people, and processes to be included in a PCI DSS assessment.

A

SCoping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The purpose is to avoid the ability and risk of out-of-scope systems to interact with the Cardholder Data Environment (CDE) systems or impact the CDE security.

A

Network Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If the ____________ is implemented correctly, even if the attacker has administrative access to the out-of-scope system, the CDE is not compromised by a segmented out-of-scope system component.

A

Network Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

May be considered when entity cannot meet a requirement explicitly as stated due to legitimate technical or documented business constraints, but has sufficiently mitigated the risk associated with the requirement through implementation of other controls.

A

Compensating Controls

17
Q

Entity, typically financial institution, that processes payment card transactions for merchants.

A

Acquirer (Company/Store’s Bank)

18
Q

Any entity that accepts payment cards bearing the logos of any of the five member of PCI SSD as payment for goods and/or services.

A

Merchant (Company, Store)

19
Q

Facilitate electronic transactions allowing customers and business to make payments using credit, debit, prepaid cards.

A

Visa
MasterCard
Discover
American Express
JCP
Union Pay

20
Q

It is based on industry-tested and accepted algorithms. Involves both encryption and hashing.

Encryption is ________, hashing is a _________ process.

Minimum of _____ bits of effective key strength.

A

Strong Cryptography

reversible
one-way

128

21
Q

Step 1: _______ pays the ______.
Step 2: _______ asks Payment Brand Network to determine the _______.

Step 3: ________ identifies the ______ and seeks approval.
Step 4: ________ approves purchase.

Step 5: _________ sends approval to the ______.
Step 6: ________ forwards approval to the ________.

Step 7: _______ completes purchase.
Step 8: _______ receives receipt.

What process is this called?

A

Step 1: Cardholder (customer) / Merchant (Store)
Step 2: Acquirer (Store’s Bank) / Issuer (Cardholder’s Bank)

Step 3: Payment Brand Network
Issuer (Cardholder’s Bank)
Step 4:Issuer (Cardholder’s Bank)

Step 5: Payment Brand Network / Acquirer (Store’s Bank)
Step 6: Acquirer (Store’s Bank) / Merchant (Store)

Step 7: Cardholder
Step 8: Cardholder

Authorization

22
Q

Step 1: ______ sends purchase information to ______.

Step 2: ______ sends purchase information to ______ .

Step 3: ______ prepares data for ______ statement.

Step 4: ______ provides complete reconciliation to the ______.

______ process involves the exchange of purchase information between all.

A

Step 1: Acquirer (Store’s Bank)
Payment Brand Network

Step 2: Payment Brand Network
Issuer (Cardholder’s Bank)

Step 3: Issuer (Cardholder’s Bank)
Cardholder’s

Step 4: Payment Brand Network
Acquirer (Store’s Bank)

Clearing

23
Q

Step 1: ______ identifies ______ through the Payment Brand Network.

Step 2: ______ sends payment to ______ for the complete purchase.

Step 3: ______ pays the ______ for the _______ purchase.

Step 4: _______ bills the ______ for the completed purchases.

______ process ensure that funds are transferred from the cardholders account to the merchant.

A

Step 1: Issuer (Cardholder’s Bank) /
Acquirer (Store’s bank)

Step 2: Issuer (Cardholder’s bank)
Acquirer (Store’s Bank)

Step 3: Acquirer (Store’s Bank / Merchant (Store) / Cardholder’s

Step 4: Issuer (Cardholder’s Bank) /
Cardholder

Settlement

24
Q
A