Skip to main content

PCI-DSS Quiz

Last Updated: 2025-02-17 Status: Complete

Test your understanding of PCI-DSS compliance with these self-assessment questions.

Compliance Levels

Question 1: Compliance Levels

What are the four PCI compliance levels for merchants, and what determines which level applies?

View Answer

Merchant Compliance Levels:

LevelAnnual TransactionsValidation Required
1> 6 millionAnnual ROC by QSA, quarterly ASV scans
21-6 millionAnnual SAQ, quarterly ASV scans
320,000-1 million (e-commerce)Annual SAQ, quarterly ASV scans
4< 20,000 e-commerce OR < 1 million totalAnnual SAQ, quarterly ASV scans

Determining Factors:

  1. Annual transaction volume by card brand
  2. E-commerce vs. card-present transactions
  3. Data breach history (automatic Level 1)

Important: Transaction counts are per card brand, not total.

Question 2: Service Provider Levels

As a PayFac (Level 1 Service Provider), what compliance validation is required annually?

View Answer

Level 1 Service Provider Requirements:

RequirementFrequencyPerformed By
Report on Compliance (ROC)AnnualQSA
Attestation of Compliance (AOC)AnnualQSA
External vulnerability scansQuarterlyASV
Internal vulnerability scansQuarterlyInternal/external
Penetration testingAnnualQualified tester
Segmentation validationEvery 6 monthsQSA

Service Provider Levels:

  • Level 1: > 300,000 transactions/year
  • Level 2: < 300,000 transactions/year

Additional Service Provider Requirements:

  • Executive management quarterly PCI review (12.4.1)
  • Passwords changed every 90 days (8.3.10)
  • Written acknowledgment to customers (12.9.1)

Scope Management

Question 3: PCI Scope Definition

What is "PCI scope" and why is reducing scope architecturally important?

View Answer

PCI Scope Definition: The collection of all system components, people, and processes that:

  • Store, process, or transmit cardholder data
  • Can connect to systems that handle cardholder data
  • Could impact the security of cardholder data

Why Reducing Scope Matters:

FactorFull ScopeReduced Scope
Systems to assess100+10-20
Compliance cost$200K-500K/year$50K-100K/year
Assessment time4-8 weeks1-2 weeks
Breach exposureHighContained
Remediation effortExtensiveFocused

Scope Reduction Strategies:

  1. Network segmentation
  2. Tokenization
  3. P2PE (Point-to-Point Encryption)
  4. Outsourcing to compliant providers

Architectural Importance:

  • Fewer systems = fewer vulnerabilities
  • Faster compliance cycles
  • Lower operational risk
  • Easier to maintain security posture

Question 4: Tokenization and Scope

How does tokenization reduce PCI scope? What still remains in scope?

View Answer

How Tokenization Reduces Scope:

Before: PAN flows through all systems → All systems in scope

After: Token flows through all systems → Only token vault in scope

Scope Impact:

ComponentWith PANWith Token
Application serversIN scopeOUT of scope
DatabasesIN scopeOUT of scope
APIsIN scopeOUT of scope
Token vaultN/AIN scope
Token generatorN/AIN scope
HSM/key managementIN scopeIN scope

What Remains IN Scope:

  1. Token vault infrastructure
  2. Token generation service
  3. Detokenization service
  4. HSM and key management
  5. Network connections to vault
  6. Admin access to token systems

Optimal Implementation: Tokenize BEFORE data enters your environment (using client-side SDK):

  • Card data never touches your systems
  • Maximum scope reduction
  • You only handle tokens

Question 5: System Scope

A system handles tokenized card data but never touches actual PANs. Is it in PCI scope?

View Answer

Answer: NO - The system is OUT of PCI scope.

Why:

  • Tokens are not cardholder data
  • Tokens have no exploitable value
  • Tokens cannot be reversed without vault access
  • The system has no connection to actual PANs

Conditions for Out-of-Scope:

  1. System receives only tokens (never PANs)
  2. System cannot access token vault
  3. System cannot perform detokenization
  4. No network path to CDE

Still IN Scope:

  • Token vault itself
  • Any system that can detokenize
  • Systems connecting to token vault
  • Key management systems

Documentation Required:

  • Confirm no PAN ever enters system
  • Document data flows
  • Validate network segmentation
  • Include in scope assessment

Requirements

Question 6: QSA vs ASV

What is the difference between a QSA and an ASV? When is each needed?

View Answer

QSA (Qualified Security Assessor):

AspectDetails
DefinitionCompany/individual certified by PCI SSC to perform assessments
RoleConducts on-site PCI compliance assessments
DeliverableReport on Compliance (ROC), Attestation of Compliance (AOC)
When NeededLevel 1 merchants and service providers
FrequencyAnnual

ASV (Approved Scanning Vendor):

AspectDetails
DefinitionCompany certified to perform external vulnerability scans
RoleAutomated scanning of external-facing systems
DeliverableASV Scan Report
When NeededAll merchants and service providers
FrequencyQuarterly

Comparison:

FactorQSAASV
TypeHuman assessmentAutomated scan
ScopeFull complianceExternal vulnerabilities
Cost$50,000-250,000+$1,000-5,000/year
Required forLevel 1All levels

Scenario Questions

Question 7: PCI Audit Preparation

Scenario: The company is preparing for its first PCI Level 1 audit. What documentation and evidence should be prepared? What are common findings that cause audit failures?

View Answer

Required Documentation:

CategoryDocuments
NetworkNetwork diagrams, data flow diagrams, firewall rules
PoliciesInformation security policy, acceptable use, access control
ProceduresChange management, incident response, key management
InventorySystem inventory, software inventory, device lists
Logs90 days of logs available, 12 months retained
EvidenceScreenshots, config exports, test results

Evidence by Requirement:

ReqEvidence Needed
1Firewall configs, rule reviews, topology
2Configuration standards, hardening evidence
3Encryption keys, data retention evidence
6Vulnerability scans, pen test results, patch logs
8User access lists, MFA configuration
10Log samples, SIEM screenshots
11ASV scans, penetration test reports
12Policies, training records, risk assessment

Common Audit Failures:

FindingIssuePrevention
Incomplete network diagramsMissing systemsUpdate continuously
Default passwordsNever changedConfiguration management
CVV in logsApplication loggingMask/truncate
Missing patchesDelayed patching30-day patch cycle
Shared accountsNo unique IDsEnforce unique logins
Incomplete loggingNot all eventsEnable all required events
Outdated policiesNo annual reviewAnnual review process
Missing segmentation testingNot validatedAnnual pen test

Question 8: New Developer Question

Scenario: A new developer joins the team and asks why card numbers are never stored directly in the database. Explain the PCI implications and the tokenization strategy.

View Answer

Why We Don't Store PANs:

If we stored PANs directly:
├── Database → IN SCOPE
├── Application servers → IN SCOPE
├── Backup systems → IN SCOPE
├── Monitoring systems → IN SCOPE
├── All admin access → IN SCOPE
└── Total: 50+ systems to secure and audit

With tokenization:
├── Token vault → IN SCOPE (1 system)
├── Everything else → OUT OF SCOPE
└── Total: 1 system to focus on

PCI Implications of Storing PANs:

FactorImpact
Compliance scopeEvery system touching PANs must comply
Annual assessmentFull QSA assessment of all systems
Security controlsFull 12 requirements on all systems
Breach liabilityAll stored PANs exposed
Cost$200K-500K+ annually

Our Tokenization Strategy:

  1. At Checkout: Customer card goes to token provider's client-side SDK
  2. Token Creation: Provider creates token, returns to our backend
  3. We Store: Only the token (e.g., tok_abc123)
  4. Processing: We send token to processor who can detokenize
  5. Result: PAN never enters our systems

Benefits:

  • Dramatically reduced scope
  • Lower compliance cost
  • Better security posture
  • Simplified architecture
  • Faster audits

Key Message to Developer: "We use tokens because it means our database, our code, and our infrastructure don't need to meet the full PCI-DSS requirements. The token provider handles that complexity."

Question 9: Password Requirements

What are the current password requirements under PCI DSS v4.0?

View Answer

PCI DSS v4.0 Password Requirements (Requirement 8.3.6):

Requirementv4.0 Standard
Minimum length12 characters (up from 7)
ComplexityNumeric AND alphabetic
Change frequencyBased on risk analysis
HistoryPrevent reuse of last 4
Failed attemptsLockout after 6 attempts

Additional Authentication Requirements:

RequirementDetails
8.4.2MFA for ALL access to CDE (not just admin)
8.3.10Service provider passwords: change every 90 days
8.5Manage system/application accounts

Comparison to Previous:

Factorv3.2.1v4.0
Length7 chars12 chars
MFA scopeAdmin onlyAll CDE access
ComplexityAny 2 typesNumeric + alpha

Summary

After completing this quiz, you should understand:

  • The four merchant and two service provider compliance levels
  • Level 1 Service Provider annual requirements
  • How to determine what's in and out of PCI scope
  • Tokenization's impact on scope
  • Difference between QSA and ASV
  • Common audit failure points
  • v4.0 password and MFA requirements
Share: