1.
Please check all that apply:
How do I protect cardholder data?
Correct Answer(s)
A. Credit card receipts must only show the last 4 digits
B. Have security policies and procedures in place
D. Limit this to only those who need this information to do their jobs
Explanation
The correct answer options provide effective measures for protecting cardholder data. By only showing the last 4 digits of credit card numbers on receipts, the risk of unauthorized access to sensitive information is minimized. Having security policies and procedures in place ensures that proper protocols are followed to safeguard cardholder data. Limiting access to this information to only those who require it for their job roles further reduces the chances of data breaches or misuse. These measures collectively contribute to protecting cardholder data from potential threats.
2.
Computers are to be locked when you are away from your work area?
Correct Answer
A. True
Explanation
It is important to lock computers when you are away from your work area to ensure the security and privacy of your data. Locking the computer prevents unauthorized access and protects sensitive information from being accessed or manipulated. It also helps to prevent any accidental or intentional changes or deletions to files and settings. Locking the computer is a simple and effective security measure that should be practiced to maintain the integrity of your work and protect your personal information.
3.
Please check all that apply:
Onsite personnel and visitors must:
Correct Answer(s)
A. Be identified and given a badge that distinguishes them from onsite personnel
B. Use of a visitor badge or state ID does NOT permit unescorted access to pHysical locations where Card Holder Data (CHD) is processed
Explanation
The correct answer is "Be identified and given a badge that distinguishes them from onsite personnel" and "Use of a visitor badge or state ID does NOT permit unescorted access to physical locations where Card Holder Data (CHD) is processed". This means that both onsite personnel and visitors must be identified and given a badge that sets them apart from regular onsite personnel. Additionally, even if a visitor has a visitor badge or state ID, they still cannot access areas where Card Holder Data is processed without being escorted.
4.
Storage containers used for materials that are to be destroyed do not need to be secured (ex. not locked)?
Correct Answer
B. False
Explanation
All hard-copy materials must be stored in storage containers that are secure.
5.
Personnel who have specific roles with EIS or Card Holder Data are required to participate in an annual training for PCI compliance?
Correct Answer
A. True
Explanation
Personnel who have specific roles with EIS or Card Holder Data are required to participate in an annual training for PCI compliance because it is crucial for them to understand the security protocols and measures necessary to protect cardholder data. This training ensures that they are aware of their responsibilities and are equipped with the knowledge to handle sensitive information securely. By participating in annual training, these personnel can stay updated with the latest security practices and help maintain PCI compliance within the organization.
6.
How many requirements does PCI DSS have?
Correct Answer
B. 12
Explanation
PCI DSS, which stands for Payment Card Industry Data Security Standard, is a set of security standards that organizations must follow to protect cardholder data. The correct answer is 12 because PCI DSS has 12 main requirements that cover various aspects of data security, such as maintaining a secure network, protecting cardholder data, implementing strong access control measures, regularly monitoring and testing networks, and maintaining an information security policy. These requirements are designed to ensure that organizations handling cardholder data maintain a high level of security to prevent data breaches and protect sensitive information.
7.
Please check all that apply;
Best Practices for Credit Card Processing include;
Correct Answer(s)
A. Segregate duties when possible
B. Remember to never store payment card data in any form
C. Only allow employees who have a legitimate business need to access cardholder information
D. Each user needs their own user ID coupled with a secure password that is changed regularly
E. Restrict pHysical access to areas where credit card information is handled and stored
Explanation
The best practices for credit card processing include segregating duties when possible, not storing payment card data in any form, only allowing employees with a legitimate business need to access cardholder information, each user having their own user ID coupled with a secure password that is changed regularly, and restricting physical access to areas where credit card information is handled and stored. These practices help to ensure the security and integrity of credit card transactions, protect cardholder information, and prevent unauthorized access and data breaches.
8.
A potential security breach might include a User ID being given out or stolen.
Correct Answer
A. True
Explanation
A potential security breach refers to a situation where unauthorized access or disclosure of sensitive information occurs. In this case, if a User ID is given out or stolen, it can lead to a security breach as it allows unauthorized individuals to access a user's account or personal information. This can result in identity theft, unauthorized transactions, or other malicious activities. Therefore, the statement "A potential security breach might include a User ID being given out or stolen" is true.