Question 1
Merchants involved with only card-not-present transactions that are completely outsourced to a PCI DSS complaint service provider may be eligible to use?
Question 2
Quarterly internal vulnerability scans should be executed and rescans as needed until what point?
Question 3
Payment cards has typically 2 tracks, track 1 and track 2 that has respectively how many characters in length?
Question 4
PCI Requirement 12.6 requires personnel to acknowledge at least _______ that they have read and understood the security policy and procedures.
Question 5
SELECT ALL THAT MATCHES
Examples of two-factor technologies include:
Examples of two-factor technologies include: