Top Compliance Quizzes & Trivia

To Know more about Compliance training courses, please visits our Compliance training software.

Related Topics


  • True or False: Exporting ITAR/EAR controlled data to foreign persons usually requires a license.
    Compliance question from

  • True or False: The owner contract never controls whether technical data is ITAR/EAR controlled.
    Compliance question from

  • True or False: Under ITAR, Technical data does not include blueprints, drawings, process specifications, photographs, plans, instructions and documentation.
    Compliance question from

  • A commercial payment product has been PA-DSS 1.2.1 validated by a PA-QSA.   It is also listed on the PCI Security Standards Council Website as a validated payment application.   As a result, the product is guaranteed to be PCI-DSS compliant when deployed in the merchant’s environment.
    Compliance question from

  • Track Data can not be stored in a payment application after authorization.
    Compliance question from

  • A customer is using an operating system (OS) that is no longer supported by the OS vendor.  However,  payment vendor can PA-DSS validate payment product on the unsupported OS using compensating controls which is allowed under the rules of PA-DSS
    Compliance question from

  • A local restaurant is offering "buy-one get-one free" entrees to all college students on Friday night.  The restaurant manager called you personally to invite you to take advantage of this special deal.  Can you accept?
    Compliance question from

  • My brother has a company which he just created a Facebook page for.  Which of the following may I do?
    Compliance question from

  • I can miss class if I am participating in a service activity coordinated by the athletic department.
    Compliance question from

  • What is one of the major risks of Money laundering?
    Compliance question from

  • What currency transaction dollar amount triggers the filing of a CTR?
    Compliance question from

  • Which of the following is a possible red flag of suspicious activity?
    Compliance question from