Question 1

Merchants involved with only card-not-present transactions that are completely outsourced to a PCI DSS complaint service provider may be eligible to use?
  • Question 2

    Quarterly internal vulnerability scans should be executed and rescans as needed until what point?
  • Question 3

    Payment cards has typically 2 tracks, track 1 and track 2 that has respectively how many characters in length?
  • Question 4

    PCI Requirement 12.6 requires personnel to acknowledge at least _______ that they have read and understood the security policy and procedures.
  • Question 5

    SELECT ALL THAT MATCHES
    Examples of two-factor technologies include: