PCI Compliance Quiz 2018

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Mvalence
M
Mvalence
Community Contributor
Quizzes Created: 1 | Total Attempts: 139
Questions: 8 | Attempts: 139

SettingsSettingsSettings
PCI Compliance Quiz 2018 - Quiz

Please complete the required quiz for the Department of Education's PCI compliance requirement in the year 2018.


Questions and Answers
  • 1. 

    Please check all that apply: How do I protect cardholder data?

    • A.

      Credit card receipts must only show the last 4 digits

    • B.

      Have security policies and procedures in place

    • C.

      Test the system with a live credit card (PAN)

    • D.

      Limit this to only those who need this information to do their jobs

    Correct Answer(s)
    A. Credit card receipts must only show the last 4 digits
    B. Have security policies and procedures in place
    D. Limit this to only those who need this information to do their jobs
    Explanation
    The correct answer options provide effective measures for protecting cardholder data. By only showing the last 4 digits of credit card numbers on receipts, the risk of unauthorized access to sensitive information is minimized. Having security policies and procedures in place ensures that proper protocols are followed to safeguard cardholder data. Limiting access to this information to only those who require it for their job roles further reduces the chances of data breaches or misuse. These measures collectively contribute to protecting cardholder data from potential threats.

    Rate this question:

  • 2. 

    Computers are to be locked when you are away from your work area?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    It is important to lock computers when you are away from your work area to ensure the security and privacy of your data. Locking the computer prevents unauthorized access and protects sensitive information from being accessed or manipulated. It also helps to prevent any accidental or intentional changes or deletions to files and settings. Locking the computer is a simple and effective security measure that should be practiced to maintain the integrity of your work and protect your personal information.

    Rate this question:

  • 3. 

    Please check all that apply: Onsite personnel and visitors must:

    • A.

      Be identified and given a badge that distinguishes them from onsite personnel

    • B.

      Use of a visitor badge or state ID does NOT permit unescorted access to physical locations where Card Holder Data (CHD) is processed

    • C.

      Visitors or onsite employees ARE able to be unescorted in physical locations where Card Holder Data (CHD) is processed

    • D.

      Visitors or onsite employees are NOT required to have an identifying badge

    Correct Answer(s)
    A. Be identified and given a badge that distinguishes them from onsite personnel
    B. Use of a visitor badge or state ID does NOT permit unescorted access to pHysical locations where Card Holder Data (CHD) is processed
    Explanation
    The correct answer is "Be identified and given a badge that distinguishes them from onsite personnel" and "Use of a visitor badge or state ID does NOT permit unescorted access to physical locations where Card Holder Data (CHD) is processed". This means that both onsite personnel and visitors must be identified and given a badge that sets them apart from regular onsite personnel. Additionally, even if a visitor has a visitor badge or state ID, they still cannot access areas where Card Holder Data is processed without being escorted.

    Rate this question:

  • 4. 

    Storage containers used for materials that are to be destroyed do not need to be secured (ex. not locked)?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    All hard-copy materials must be stored in storage containers that are secure.

    Rate this question:

  • 5. 

    Personnel who have specific roles with EIS or Card Holder Data are required to participate in an annual training for PCI compliance?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Personnel who have specific roles with EIS or Card Holder Data are required to participate in an annual training for PCI compliance because it is crucial for them to understand the security protocols and measures necessary to protect cardholder data. This training ensures that they are aware of their responsibilities and are equipped with the knowledge to handle sensitive information securely. By participating in annual training, these personnel can stay updated with the latest security practices and help maintain PCI compliance within the organization.

    Rate this question:

  • 6. 

    How many requirements does PCI DSS have?

    • A.

      10

    • B.

      12

    • C.

      24

    • D.

      9

    Correct Answer
    B. 12
    Explanation
    PCI DSS, which stands for Payment Card Industry Data Security Standard, is a set of security standards that organizations must follow to protect cardholder data. The correct answer is 12 because PCI DSS has 12 main requirements that cover various aspects of data security, such as maintaining a secure network, protecting cardholder data, implementing strong access control measures, regularly monitoring and testing networks, and maintaining an information security policy. These requirements are designed to ensure that organizations handling cardholder data maintain a high level of security to prevent data breaches and protect sensitive information.

    Rate this question:

  • 7. 

    Please check all that apply; Best Practices for Credit Card Processing include;

    • A.

      Segregate duties when possible

    • B.

      Remember to never store payment card data in any form

    • C.

      Only allow employees who have a legitimate business need to access cardholder information

    • D.

      Each user needs their own user ID coupled with a secure password that is changed regularly

    • E.

      Restrict physical access to areas where credit card information is handled and stored

    Correct Answer(s)
    A. Segregate duties when possible
    B. Remember to never store payment card data in any form
    C. Only allow employees who have a legitimate business need to access cardholder information
    D. Each user needs their own user ID coupled with a secure password that is changed regularly
    E. Restrict pHysical access to areas where credit card information is handled and stored
    Explanation
    The best practices for credit card processing include segregating duties when possible, not storing payment card data in any form, only allowing employees with a legitimate business need to access cardholder information, each user having their own user ID coupled with a secure password that is changed regularly, and restricting physical access to areas where credit card information is handled and stored. These practices help to ensure the security and integrity of credit card transactions, protect cardholder information, and prevent unauthorized access and data breaches.

    Rate this question:

  • 8. 

    A potential security breach might include a User ID being given out or stolen.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A potential security breach refers to a situation where unauthorized access or disclosure of sensitive information occurs. In this case, if a User ID is given out or stolen, it can lead to a security breach as it allows unauthorized individuals to access a user's account or personal information. This can result in identity theft, unauthorized transactions, or other malicious activities. Therefore, the statement "A potential security breach might include a User ID being given out or stolen" is true.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 13, 2018
    Quiz Created by
    Mvalence
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.