Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

PCI Data Security Standard (PCI DSS) Exam Questions and Answers, Exams of Payment Systems

A comprehensive set of questions and answers related to the payment card industry data security standard (pci dss). It covers various aspects of pci dss, including sensitive authentication data, network segmentation, compensating controls, and payment card processing. Useful for individuals preparing for pci dss exams or seeking to understand the key concepts and requirements of the standard.

Typology: Exams

2024/2025

Available from 02/18/2025

calleb-kahuro
calleb-kahuro 🇺🇸

5

(5)

1.3K documents

1 / 45

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
PCIP EXAM-2025 ACTUAL EXAM QUESTIONS (184
QUESTIONS) AND ANSWERS 100% CORRECT
PCI Data Security Standard (PCI DSS)
ANSWER
The PCI DSS applies to all entities that store, process, and/or transmit
cardholder data. It covers technical
and operational system components included in or connected to cardholder
data. If you accept or process payment cards, PCI DSS applies to you.
Sensitive Authentication Data
ANSWERMerchants, service providers, and other entities involved with
payment card processing must never store sensitive authentication data after
authorization. This includes the 3- or 4- digit security code printed on the
front or back of a card (CVD), the data stored on a card's magnetic stripe or
chip (also called "Full Track Data") - and personal identification numbers
(PIN) entered by the cardholder.
Card Verification Data Codes (CVD)
ANSWER3 or 4 digit code that further authenticates a not-present
cardholder
Visa-CVV2
MC- CVC2
Discover- CVD
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d

Partial preview of the text

Download PCI Data Security Standard (PCI DSS) Exam Questions and Answers and more Exams Payment Systems in PDF only on Docsity!

PCIP EXAM- 2025 ACTUAL EXAM QUESTIONS (

QUESTIONS) AND ANSWERS 100% CORRECT

PCI Data Security Standard (PCI DSS) – ANSWER ✅The PCI DSS applies to all entities that store, process, and/or transmit cardholder data. It coverstechnical and operational system components included in or connected to cardholder data. If you accept or process payment cards, PCI DSS applies to you. Sensitive Authentication Data – ANSWER✅Merchants, service providers,and other entities involved with payment card processing must never store sensitiveauthentication data after authorization. This includes the 3- or 4- digit security code printed on the front or back of a card (CVD), the data stored on a card's magnetic stripe or chip (also called "Full Track Data") - and personal identification numbers (PIN) entered by the cardholder. Card Verification Data Codes (CVD) – ANSWER ✅ 3 or 4 digit code thatfurther authenticates a not-present cardholder Visa-CVV MC- CVC Discover- CVD

JCB-CAV

AmEx- CID Requirement 1 – ANSWER ✅Install and maintain a firewall configuration toprotect cardholder data Network devices in scope for Requirement 1

  • ANSWER ✅Firewalls and Routers- Routers connect traffic between networks, Firewalls control the traffic between networks and within internal network QIR Qualified Integrators & Resellers
  • ANSWER ✅Qualified Integrators & Resellers- authorized by the SSC to implement, configure and/or support PA-DSS payment applications. Visa requires all level 4 merchants use QIRs for POS application and terminal installation and servicing Compensating Controls - ANSWER ✅An alternative control, put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time.

Compensating Controls Worksheet - ANSWER ✅1) Constraint; 2) Objective;

  1. Identified Risk; 4) Define Compensating Control; 5)Validate Controls; 6) Maintenance (COIDVM) Card Data that cannot be stored by Merchants, Service providers after authorization - ANSWER ✅Sensitive Authentication Data. i) 3- or 4- digit security code printed on the front or back of a card, ii) data stored on a card's magnetic stripe or chip (also called "Full Track Data"), and iii) personal identification numbers (PIN) entered by the cardholder Card Data that MAY be stored - ANSWER ✅i) cardholder name, ii) servicecode (identifies industry iii) Personal Account Number (PAN) iv) expiration date may be stored. Network Segmentation - ANSWER ✅The process of isolating the cardholder data environment from the remainder of an entity's network Not a requirement but strongly recommended. Report on Compliance (ROC) - ANSWER ✅Prepared at the time of the assessment of PCI compliance and comprehensively provides details aboutthe assessment approach and compliance standing against each PCI DSS requirement What is included in the Report on Compliance (ROC)? - ANSWER ✅ROC includes (1) Executive summary, (2) description of scope of work and

approach taken, (3) details about reviewed environment, (4) contact information and report date, (5) quarterly scan results and (6) findings and observations. Steps to take for a PCI Assessment (hint: SARA's Remediation) - SOLUTION ✅1. Scope - determine which system components and networks are in scope for PCI DSS

2. Assess - examine the compliance of system components in scope following

the testing procedures for each PCI DSS requirement

3. Report - assessor and/or entity completes required documentation (e.g.

Self-Assessment Questionnaire (SAQ) or Report on Compliance (ROC)), includingdocumentation of all compensating controls

4. Attest - complete the appropriate Attestation of Compliance (AOC)

5. Submit - submit the SAQ, ROC, AOC and other requested supporting

documentation such as ASV scan reports to the acquirer (for merchants) or to the payment brand/requestor (for service providers)

6. Remediate - if required, perform remediation to address requirements

that are not in place, and

  1. Outsourcing: Outsourcing all or some of your payment card processing capabilities to a PCI DSS compliant service provider can reduce PCI scope. This is especially relevant to companies conducting eCommerce transactions only.
  1. Tokenization:Stores card numbers and other sensitive data such as social security numbers in an off-site highly secure data vault. The payment card numbers are replaced with tokens in all other databases and applications. Not storing cardholder data anywhere greatly simplifies the scope of PCI Requirement. Who makes up the PCI Security Standards Council? - ANSWER ✅1) Five payment brands (Am Ex, JCB, Visa, MC, Discover), and 2) Payment Organizations (merchants, banks, processors, hardware and software developers, point of sale vendors). Card Processing Authorization- who does the merchant request and receive authorization from to complete the purchase? What is provided to the merchant? - ANSWER ✅The Issuer provides an Authorization Code to the merchant Card Processing Clearing- who shares what? - ANSWER ✅Acquirer andIssuer exchange payment information- usually 24 hr period in U.S. Card Processing Settlement- who does acquirer pay? What does Issuer do? - ANSWER ✅1) Acquirer pays merchant and 2) Issuer bills cardholder (i.e. cardholder is charged)
  • Reconciliation takes place, issuer records, posts the transaction whichappears on the cardholder's monthly statement What are the 3 steps in Payment Card Processing? - ANSWER ✅1) Authorization 2) Clearing 3) Settlement

In which step does the Payment Brand Network provide completereconciliation to the merchant bank? - ANSWER ✅Clearing (PA-DSS) Payment Application Data Security Standard - ANSWER ✅Third party payment applications that authorize and settle Examples- POS, Shopping Cart Role of Payment Brand Network - ANSWER ✅1) Develop and Enforce Compliance Programs, 2) Accept validation documentation from approved QSA, PA-QSA, and ASV companies, and 3) endorse the QSA, PA-QSA and ASV company qualification criteria Point to Point Encryption (P2PE) Requirements - ANSWER ✅ 1 - Secure encryption of payment card data at Point of Interaction (POI) 2 - Validated apps at the POI 3 - Secure environment of encryption and decryption devices 4 - Manage decryption environment and ALL decrypted account data 5 - Use source encryption technologies and cryptographic key elements-like key generation, distribution, loading and injection, administration and usage May reduce PCI-DSS scope for Merchant

  • Geared toward provider of point to point ANSWER(e.g. Processor, Acquirer, payment gateway (e.g. PayPal)

(PA-DSS) Payment Application DSS - ANSWER ✅Most payment application (PA-DSS) requirements are equivalent of PCI-DSS

  • Geared toward the Application providers P2PE - ANSWER ✅P2PE- Incorporates requirements from PTS, PCI-DSS, PA- DSS, and PCI-PIN Protects cc data from point of capture to processing (PCI-PTS) PIN- Transaction Security Devices - ANSWER ✅PCI-PTS applies to pin entry devices/ point of interaction devices (POI), Encrypting Pin Pads (EPP), Point of Sale devices (POS), Hardware (or host) security modules (HSMs), Unattended Payment Terminals (UPT)s, and non-PIN entry module
  • Geared toward Device Manufacturers PCI-PTS - what does the program ensure against? - ANSWER ✅ 1 - Terminals cannot be manipulated or hacked, or access to pins/keys 2 - Secure Read and Exchange Module (SREM)- allows terminals to be approved for the secure encryption of cardholder data as part of the P2PE program
  • Document data flow before the assessment Name 3 methods to protect PAN per PCI-DSS 3.4 - ANSWER ✅1) Hashing, 2)Encryption, 3)Truncation
  • to make PAN unreadable when stored- hash the entire PAN completely using strong cryptography May Full track data or Sensitive Authentication Data be stored AFTER authentication? - ANSWER ✅No, even if it is protected. Exception: Issuers or Issue processors may be able to store SAD if there is a business need Location for Track Data Storage - ANSWER ✅Databases, Flat Files, Log Files, Debug Files
  • Systems that typically store track data- POS Systems, POS servers, Authorization servers How frequent review firewall and router rule sets? Req. 1.1.7 - SOLUTION ✅Every six (6) months (at least)

What is an untrusted network? - ANSWER ✅An untrusted network is any network that is external to the networks of the entity being reviewed and/or which is out of the entity's ability to control or manage. Req. 1.2 Restrict Traffic - ANSWER ✅Restrict all traffic inbound andoutbound from untrusted networks (including wireless) and hosts

  • Deny all other traffic except protocols necessary for the CDE Req. 1.2.3 Where do firewalls have to be installed? - ANSWER ✅Betweenall wireless networks and the CDE Requirement 2 - ANSWER ✅Do NOT use vendor-supplied defaultpasswords and other security parameters (ALL default passwords)
  • inventory system components
  • Ensure non-console access to network devices, servers and othercomponents is encrypted
  • Sources of industry accepted system hardening (configuration) standards(Req.
    • ANSWER ✅1) Center for Internet Security (CIS)

2) International Organization for Standardization (ISO)

3) SysAdmin Audit Network Security (SANS) Institute

4) National Institute of Standards Technology (NIST)

  • must identify locations and flows of CHD
  • identify all systems connected to, or if compromised could impact the CDE How frequently do segmentation controls have to be tested? - SOLUTION ✅At least annually (Req. 11.3.4) Maximum PAN digits that may be displayed - ANSWER ✅First 6 or last 4 digits
  • POS receipt stricter requirements trumps How to render PAN unreadable? - ANSWER ✅1) One way hash functions based on strong cryptography

2) Truncation

3) Index Tokens and Securely Stored Pads

4) Strong Cryptography

Requirement 3 - ANSWER ✅Protect stored cardholder data

  • PAN and SAD
  • after authorization it cannot be stored (even if encrypted-SAD)
  • issuers exception for business need Requirement 3.3 - ANSWER ✅Protect PAN on display (printed receipts, screens, printouts)
  • different from Req. 3.4- protect PAN stored on databases or soft files Req. 3.2 Do NOT Store SAD after authorization - ANSWER ✅Don't storeSAD (sensitive authentication data) after authorization
  • render unrecoverable
  • Exception for Issuers- may store SAD if business need and secure Req. 3.2.2 Track Data - ANSWER ✅Track data located in magnetic stripeback of card
  • Track equivalent data found on the Chip - but has a unique code Req. 3.4 If stored, PAN must be Unreadable - ANSWER ✅PAN must be unreadable if stored Tech. Solutions to make unreadable:
  • One way hash functions of the entire PAN
  • truncation
  • index tokens w/ secure pads
  • strong cryptography Req. 3.2.3 - ANSWER ✅Don't store PIN after authorization Req. 3.6.6 - ANSWER ✅Manual clear text cryptographic key management if used, must be managed by: 1) Split Knowledge and 2) Dual Control
  • include security when defining requirements for software development
  • for apps, get rid of development, test accounts, test user ids and passwords from the production code before it goes live- could give away info about app functionality Req. 6 - ANSWER ✅Maintain and develop secure systems and applications
  • identify security vulnerabilities (at a minimum identify all high risk vulnerabilities)
  • rank the security vulnerabilities
  • criteria for ranking vulnerabilities: I) consideration of the CVSS base score, and/or ii) classification by the vendor, and/or iii) type of systems affected
  • install vendor supplied security patches, critical patches within one monthof release, lower risk- 2 to 3 months of release-Req. 6. Req. 6.3.2 Code Reviews - ANSWER ✅Code reviews 1) be reviewed by someone (knowledgeable on code and security) other than the person that wrote the code; 2) should ensure written with secure coding guidelines; 3)any corrections implemented before release; 4) code review results reviewed by management before release.

Req. 6.4 Change control procedures and processes - ANSWER ✅Followchange control procedures and processes for ALL changes to system components

  • separate development/test environments from production environmentsand enforce separation with access controls
  • separate development/test duties from production duties (e.g. developer uses administrator level account to develop environment, and separate account with user level access to production environment) Req. 6.3.4 and 6.4.4 Live PANs-Testing/Development - ANSWER ✅Live PANs CANNOT be used for testing or development
  • Remove even test data and test accounts before system component goesactive (in production) Req. 6.5.1 through 6.5.10 Minimum Controls- Coding Vulnerabilities-Software Development - ANSWER ✅Minimum controls include:

1) Train developers (at least) annually- up to date coding techniques

2) Develop apps based on secure coding guidelines