Incident Management Response Week3
docx
keyboard_arrow_up
School
Grand Rapids Community College *
*We aren’t endorsed by this school
Course
CYBER SECU
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
2
Uploaded by ConstableWildcatMaster401
Congratulations! You passed!
Grade received 95.83%
Latest Submission Grade 95.83%
To pass 80% or higher
Go to next item
1.
Question 1
Which group suffers from the most PoS attacks?
1 / 1 point
Government agencies.
Restaurants and small retail stores.
Large online retailers like Amazon.com
Social media companies like Facebook and Instagram.
Correct
Correct!
2.
Question 2
Which three (3) of these control processes are included in the PCI-DSS standard? (Select 3)
0.75 / 1 point
Build and maintain a secure network and systems
Correct
Partially correct!
Protect cardholder data
Correct
Partially correct!
Maintain a vulnerability management program
Correct
Partially correct!
Require use of multi-factor authentication for new card holders
This should not be selected
Incorrect. Perhaps you should review the video Point of Sale Breach Overview
3.
Question 3
Which three (3) of these are PCI-DSS requirements for any company handling, processing or transmitting credit card data? (Select 3)
1 / 1 point
Use and regularly update antivirus software
Correct
Partially correct!
Develop and maintain secure systems and applications
Correct
Partially correct!
All employees with direct access to cardholder data must be bonded
Encrypt transmission of cardholder data across open, public networks
Correct
Partially correct!
4.
Question 4
Which three (3) additional requirements did the Ingenico Group recommend be used to enhance credit card transactions above and beyond the requirements found in PCI-DSS? (Select 3)
1 / 1 point
Mobile Device Management (MDM)
Correct
Partially correct!
Employee Education
Correct
Partially correct!
Tokenization
Correct
Partially correct!
Discontinue use of magnetic strip readers and cards
5.
Question 5
When is credit card data most vulnerable to PoS malware?
1 / 1 point
While in RAM
While stored on the PoS device hard drive
While in transit between the PoS device and the credit card processing center
After the card data has been received by the credit card processor
Correct
Correct!
6.
Question 6
Which scenario best describes how a stolen credit card number is used to enrich the thief?
1 / 1 point
Credit card thieves sell stolen credit cards directly to carders using weekly dark web auctions. The carders then encode credit card blanks with the stolen numbers and resell the cards
Credit card thieves use stolen credit cards to buy merchandise that is then returned to the store in exchange for store credit that is sold at a discount for profit
Credit card thieves resell stolen card numbers to dark web companies that use call-center style operations to purchase goods on behalf of customers who pay for them at discounted rates using real credit cards
Stolen credit card numbers are sold to brokers who resell them to carders who use them to buy prepaid credit cards that are then used to buy gift cards that will be used to buy merchandise for resale
Correct
Correct!
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help