Incident Management Response Week3

docx

School

Grand Rapids Community College *

*We aren’t endorsed by this school

Course

CYBER SECU

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

2

Uploaded by ConstableWildcatMaster401

Report
Congratulations! You passed! Grade received 95.83% Latest Submission Grade 95.83% To pass 80% or higher Go to next item 1. Question 1 Which group suffers from the most PoS attacks? 1 / 1 point Government agencies. Restaurants and small retail stores. Large online retailers like Amazon.com Social media companies like Facebook and Instagram. Correct Correct! 2. Question 2 Which three (3) of these control processes are included in the PCI-DSS standard? (Select 3) 0.75 / 1 point Build and maintain a secure network and systems Correct Partially correct! Protect cardholder data Correct Partially correct! Maintain a vulnerability management program Correct Partially correct! Require use of multi-factor authentication for new card holders This should not be selected Incorrect. Perhaps you should review the video Point of Sale Breach Overview 3. Question 3 Which three (3) of these are PCI-DSS requirements for any company handling, processing or transmitting credit card data? (Select 3) 1 / 1 point Use and regularly update antivirus software Correct Partially correct! Develop and maintain secure systems and applications Correct Partially correct! All employees with direct access to cardholder data must be bonded Encrypt transmission of cardholder data across open, public networks Correct Partially correct! 4. Question 4 Which three (3) additional requirements did the Ingenico Group recommend be used to enhance credit card transactions above and beyond the requirements found in PCI-DSS? (Select 3) 1 / 1 point
Mobile Device Management (MDM) Correct Partially correct! Employee Education Correct Partially correct! Tokenization Correct Partially correct! Discontinue use of magnetic strip readers and cards 5. Question 5 When is credit card data most vulnerable to PoS malware? 1 / 1 point While in RAM While stored on the PoS device hard drive While in transit between the PoS device and the credit card processing center After the card data has been received by the credit card processor Correct Correct! 6. Question 6 Which scenario best describes how a stolen credit card number is used to enrich the thief? 1 / 1 point Credit card thieves sell stolen credit cards directly to carders using weekly dark web auctions. The carders then encode credit card blanks with the stolen numbers and resell the cards Credit card thieves use stolen credit cards to buy merchandise that is then returned to the store in exchange for store credit that is sold at a discount for profit Credit card thieves resell stolen card numbers to dark web companies that use call-center style operations to purchase goods on behalf of customers who pay for them at discounted rates using real credit cards Stolen credit card numbers are sold to brokers who resell them to carders who use them to buy prepaid credit cards that are then used to buy gift cards that will be used to buy merchandise for resale Correct Correct!
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help