SAQ T1 Flashcards

1
Q

Administrative Access

A

Elevated or increased privileges granted to an account in order for that account to manage systems, networks, and/or applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authorization

A

Granting of access or other rights to a user, program, or process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Card Skimmer

A

A physical device, often attached to a legitimate card-reading device, designed to illegitimately capture and/or store the information from a payment card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Degaussing

A

Disk degaussing.” Process or technique that demagnetizes the disk such that all data stored on the disk is permanently destroyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disk Encryption

A

Technique or technology (either software or hardware) for encrypting all stored data on a device (for example, a hard disk or flash drive). Alternatively, File-Level Encryption or Column-Level Database Encryption is used to encrypt contents of specific files or columns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Operating System / OS

A

Software of a computer system that is responsible for the management and coordination of all activities and the sharing of computer resources. Examples of operating systems include Microsoft Windows, Mac OS, Linux and Unix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PED

A

PIN Entry Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Personnel

A

Full-time and part-time employees, temporary employees, contractors, and consultants who are “resident” on the entity’s site or otherwise have access to the cardholder data environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

POI

A

“Point of Interaction”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Policy

A

Organization-wide rules governing acceptable use of computing resources, security practices, and guiding development of operational procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

POS

A

“point of sale.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Privileged User

A

Any user account with greater than basic access privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

QIR

A

Qualified Integrator or Reseller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Removable Electronic Media

A

Media that store digitized data and which can be easily removed and/or transported from one computer system to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Secure Wipe

A

“secure delete,” a method of overwriting data residing on a hard disk drive or other digital media, rendering the data irretrievable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Officer

A

Primary responsible person for an entity’s security-related affairs.

17
Q

Security Policy

A

Set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information.

18
Q

Sensitive Area

A

Any data center, server room or any area that houses systems that stores, processes, or transmits cardholder data.

19
Q

Smart Card

A

“chip card” or “IC card (integrated circuit card)

20
Q

System Components

A

Any network component, server, or application included in or connected to the cardholder data environment.