Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

PCI SSC QSA_New_V4 Dumps

Page: 1 / 4
Total 40 questions

Qualified Security Assessor V4 Exam Questions and Answers

Question 1

Which of the following file types must be monitored by a change-detection mechanism (for example, a file-integrity monitoring tool)?

Options:

A.

Application vendor manuals

B.

Files that regularly change

C.

Security policy and procedure documents

D.

System configuration and parameter files

Question 2

Security policies and operational procedures should be?

Options:

A.

Encrypted with strong cryptography.

B.

Stored securely so that only management has access.

C.

Reviewed and updated at least quarterly.

D.

Distributed to and understood by ail affected parties.

Question 3

Where an entity under assessment is using the customized approach, which of the following steps is the responsibility of the assessor?

Options:

A.

Monitor the control.

B.

Derive testing procedures and document them in Appendix E of the ROC.

C.

Document and maintain evidence about each customized control as defined in Appendix E of PCI DSS.

D.

Perform the targeted risk analysis as per PCI DSS requirement 12.3.2.

Question 4

In the ROC Reporting Template, which of the following Is the best approach for a response where the requirement was "In Place’?

Options:

A.

Details of the entity's project plan for implementing the requirement.

B.

Details of how the assessor observed the entity's systems were compliant with the requirement.

C.

Details of the entity's reason for not implementing the requirement

D.

Details of how the assessor observed the entity's systems were not compliant with the requirement

Question 5

In accordance with PCI DSS Requirement 10, how long must audit logs be retained?

Options:

A.

At least 1 year, with the most recent 3 months immediately available.

B.

At least 2 years, with the most recent 3 months immediately available.

C.

At least 2 years, with the most recent month immediately available.

D.

At least 3 months, with the most recent month immediately available.

Question 6

Could an entity use both the Customized Approach and the Defined Approach to meet the same requirement?

Options:

A.

No,because a single approach must be selected.

B.

No,because only compensating controls can be used with the Defined Approach.

C.

Yes, if the entity uses no compensating controls.

D.

Yes, if the entity is eligible to use both approaches.

Question 7

Which statement about PAN is true?

Options:

A.

It must be protected with strong cryptography for transmission over private wireless networks.

B.

It must be protected with strong cryptography tor transmission over private wired networks.

C.

It does not require protection for transmission over public wireless networks.

D.

It does not require protection for transmission over public wired networks.

Question 8

A sample of business facilities is reviewed during the PCI DSS assessment. What is the assessor required to validate about the sample?

Options:

A.

It includes a consistent set of facilities that are reviewed for all assessments.

B.

The number of facilities in the sample is at least 10 percent of the total number of facilities.

C.

Every facility where cardholder data is stored is reviewed.

D.

All types and locations of facilities are represented.

Question 9

What must be included in an organization's procedures for managing visitors?

Options:

A.

Visitors are escorted at all times within areas where cardholder data is processed or maintained.

B.

Visitor badges are identical to badges used by onsite personnel.

C.

Visitor log includes visitor name, address, and contact phone number.

D.

Visitors retain their identification (for example, a visitor badge) for 30 days after completion of the visit.

Question 10

A retail merchant has a server room containing systems that store encrypted PAN data. The merchant has Implemented a badge access-control system that Identifies who entered and exited the room, on what date, and at what time. There are no video cameras located in the server room.Based on this information, which statement is true regarding PCI DSS physical security requirements?

Options:

A.

The badge access-control system must be protected from tampering or disabling.

B.

The merchant must Install video cameras in addition to the existing access-control system.

C.

Data from the access-control system must be securely deleted on a monthly basis.

D.

The merchant must install motion-sensing alarms In addition to the existing access-control system.

Question 11

If segmentation is being used to reduce the scope of a PCI DSS assessment, the assessor will?

Options:

A.

Verify the segmentation controls allow only necessary traffic Into the cardholder data environment.

B.

Verify the payment card brands have approved the segmentation.

C.

Verify that approved devices and applications are used for the segmentation controls.

D.

Verify the controls used for segmentation are configured properly and functioning as intended

Question 12

An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA, while also ensuring that the customized control is implemented securely. Which of the following statements is true?

Options:

A.

You can assess the customized control, but another assessor must verify thatyou completed the TRA correctly.

B.

You can assess the customized control and verify that the customized approach was correctly followed, but you must document this in the ROC.

C.

You must document the work on the customized control in the ROC, but you can not assess the control or the documentation.

D.

Assessors are not allowed to assist an entity with the completion of the Controls Matrix or the TRA.

Page: 1 / 4
Total 40 questions