Qualified Security Assessor V4 Exam Questions and Answers
Which of the following file types must be monitored by a change-detection mechanism (for example, a file-integrity monitoring tool)?
Security policies and operational procedures should be?
Where an entity under assessment is using the customized approach, which of the following steps is the responsibility of the assessor?
In the ROC Reporting Template, which of the following Is the best approach for a response where the requirement was "In Place’?
In accordance with PCI DSS Requirement 10, how long must audit logs be retained?
Could an entity use both the Customized Approach and the Defined Approach to meet the same requirement?
Which statement about PAN is true?
A sample of business facilities is reviewed during the PCI DSS assessment. What is the assessor required to validate about the sample?
What must be included in an organization's procedures for managing visitors?
A retail merchant has a server room containing systems that store encrypted PAN data. The merchant has Implemented a badge access-control system that Identifies who entered and exited the room, on what date, and at what time. There are no video cameras located in the server room.Based on this information, which statement is true regarding PCI DSS physical security requirements?
If segmentation is being used to reduce the scope of a PCI DSS assessment, the assessor will?
An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA, while also ensuring that the customized control is implemented securely. Which of the following statements is true?