Black Friday Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

PCI SSC Assessor_New_V4 Dumps

Assessor_New_V4 Exam Questions and Answers

Question 1

What is the intent of classifying media that contains cardholder data?

Options:

A.

Ensuring that media is property protected according to the sensitivity of the data it contains

B.

Ensuring that media containing cardholder data is moved from secured areas an a quarterly basis

C.

Ensuring that media is clearly and visibly labeled as 'Confidential so all personnel know that the media contains cardholder data

D.

Ensuring that all media is consistently destroyed on the same schedule regardless of the contents

Question 2

What does the PCI PTS standard cover?

Options:

A.

Point-of-interaction devices used to protect account data

B.

Secure coding practices for commercial payment applications.

C.

Development of strong cryptographic algorithms

D.

End-to-end encryption solutions for transmission of account data

Question 3

A sample of business facilities is reviewed during the PCI DSS assessment What is the assessor required to validate about the sample?

Options:

A.

It includes a consistent set of facilities that are reviewed for all assessments.

B.

The number of facilities in the sample is at least 10 percent of the total number of facilities

C.

Every facility where cardholder data is stored is reviewed

D.

All types and locations of facilities are represented

Question 4

Which statement about PAN is true?

Options:

A.

It must be protected with strong cryptography for transmission over private wireless networks

B.

It must be protected with strong cryptography (or transmission over private wired networks

C.

It does not require protection for transmission over public wireless networks

D.

It does not require protection for transmission over public wired networks

Question 5

An internal NTP server that provides time services to the Cardholder Data Environment is?

Options:

A.

Only in scope if it provides time services to database servers.

B.

Not in scope for PCI DSS

C.

Only m scope if it stores processes or transmits cardholder data

D.

In scope for PCI DSS

Question 6

An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA. while also ensuing that the customized control is implemented securely. Which of the following statements is true?

Options:

A.

You can assess the customized control but another assessor must verify that you completed the TRA correctly.

B.

You can assess the customized control and verify that the customized approach was correctly followed but you must document this in the ROC.

C.

You must document the work on the customized control in the ROC but you can not assess the control or the documentation.

D.

Assessors are not allowed to assist an entity with the completion of the Controls Matrix or the TRA.

Question 7

Where can live PANs be used for testing?

Options:

A.

Production (live) environments only

B.

Pre-production (test) environments only if located outside the CDE.

C.

Pre-production environments that are located within the CDE

D.

Testing with live PANs must only be performed in the QSA Company environment

Question 8

Passwords for default accounts and default administrative accounts should be?

Options:

A.

Changed within 30 days after installing a system on the network.

B.

Reset to the default password before installing a system on the network

C.

Changed before installing a system on the network

D.

Configured to expire in 30 days

Question 9

If an entity shares cardholder data with a TPSP, what activity is the entity required to perform'?

Options:

A.

The entity must conduct ASV scans on the TPSP's systems at least annually

B.

The entity must perform a risk assessment of the TPSP's environment at least quarterly.

C.

The entity must test the TPSP's incident response plan at least quarterly

D.

The entity must monitor the TPSP's PCI DSS compliance status at least annually

Question 10

An entity is using custom software in their CDE. The custom software was developed using processes that were assessed by a Secure Software Lifecycle assessor and found to be fully compliant with the Secure SLC standard. What impact will this have on the entity's PCI DSS assessment?

Options:

A.

It automatically makes an entity PCI DSS compliant

B.

It may help the entity to meet several requirements in Requirement 6.

C.

There is no impact to the entity

D.

The custom software can be excluded from the PCI DSS assessment

Question 11

Which statement about the Attestation of Compliance (AOC) is correct?

Options:

A.

There are different AOC templates for service providers and merchants

B.

The AOC must be signed by both the merchant/service provider and by PCI SSC

C.

The same AOC template is used for ROCs and SAQs

D.

The AOC must be signed by either the merchant service provider or the QSA'ISA

Question 12

Viewing of audit log files should be limited to?

Options:

A.

Individuals who performed the logged activity

B.

Individuals with read/write access

C.

Individuals with administrator privileges

D.

Individuals with a job-related need

Question 13

Which statement is true regarding the PCI DSS Report on Compliance (ROC)?

Options:

A.

The ROC Reporting Template and instructions provided by PCI SSC should be used for all ROCs.

B.

The assessor may use either their own template or the ROC Reporting Template provided by PCI SSC

C.

The assessor must create their own ROC template for each assessment report

D.

The ROC Reporting Template provided by PCI SSC is only required for service provider assessments

Question 14

Which of the following is true regarding internal vulnerability scans?

Options:

A.

They must be performed after a significant change

B.

They must be performed by an Approved Scanning Vendor (ASV)

C.

They must be performed by QSA personnel

D.

They must be performed at least annually

Question 15

The intent of assigning a risk ranking to vulnerabilities is to?

Options:

A.

Ensure all vulnerabilities are addressed within 30 days

B.

Replace the need to quarterly ASV scans

C.

Prioritize the highest risk items so they can be addressed more quickly

D.

Ensure that critical security patches are installed at least quarterly

Question 16

What must the assessor verify when testing that PAN is protected whenever it is sent over the Internet?

Options:

A.

The security protocol is configured to support earlier versions

B.

The PAN is encrypted with strong cryptography

C.

The security protocol is configured to accept all digital certificates

D.

The PAN is securely deleted once the transmission has been sent

Question 17

Which of the following types of events is required to be logged?

Options:

A.

All use of end-user messaging technologies

B.

All access to external web sites

C.

All access to all audit trails

D.

All network transmissions

Question 18

An LDAP server providing authentication services to the cardholder data environment is

Options:

A.

in scope for PCI DSS.

B.

not in scope for PCI DSS

C.

in scope only if it stores processes or transmits cardholder data

D.

in scope only if it provides authentication services to systems in the DMZ

Page: 1 / 6
Total 60 questions