PCI DSS 3.2

PCI DSS 3.2

Professional Development

25 Qs

quiz-placeholder

Similar activities

FT.com Quiz

FT.com Quiz

Professional Development

20 Qs

SPECTRUM GST QUIZ

SPECTRUM GST QUIZ

Professional Development

20 Qs

Evaluasi Materi Training OAG 2024

Evaluasi Materi Training OAG 2024

Professional Development

20 Qs

Day 4 - BLS

Day 4 - BLS

Professional Development

20 Qs

Final RQ Quiz review

Final RQ Quiz review

Professional Development

20 Qs

ISO and Quality

ISO and Quality

Professional Development

20 Qs

Quiz CA IT SSC

Quiz CA IT SSC

Professional Development

25 Qs

Quiz 3

Quiz 3

Professional Development

20 Qs

PCI DSS 3.2

PCI DSS 3.2

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

Bill Depalma

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How often should penetration tests be conducted for merchants?

Every quarter

Every 2 years

Every year

Every 6 months

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A payment token is used for?

Randomization of account data

Collecting Payment card information in a centralized location

End to end encryption

Fraud detection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False --- The PCI SSC was created to have consistent fines and processes if a company is out of compliance.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All merchants levels are required to have

Penetration Testing

ASV scan

Service Providers

QSA Audits

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Attestation of Compliance (AOC) is

A detailed document describing the CDE

Used to train merchants on PCI

Document from QSA certifying compliance

Hundreds of pages long

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The internal security assessor is used to

Quality control of QSA documents

Evaluate service providers

Complete SAQ D

Conduct internal audit of level 2 merchants

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The goal of building and maintaining a secure environment has which requirements?

Restrict physical access and require unique IDs

Maintaining a security policy

Frewalls and no default passwords

strong encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?