Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

PCI SSC Assessor_New_V4 Assessor_New_V4 Exam Practice Test

Assessor_New_V4 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

In accordance with PCI DSS Requirement 10. how long must audit logs be retained?

Options:

A.

At least 1 year, with the most recent 3 months immediately available

B.

At least 2 years, with the most recent 3 months immediately available

C.

At least 2 years with the most recent month immediately available

D.

At least 3 months with the most recent month immediately available

Question 2

What must be included m an organization’s procedures for managing visitors?

Options:

A.

Visitors are escorted at all times within areas where cardholder data is processed or maintained

B.

Visitor badges are identical to badges used by onsite personnel

C.

Visitor log includes visitor name, address, and contact phone number

D.

Visitors retain their identification (for example a visitor badge) for 30 days after completion of the visit

Question 3

Which of the following is true regarding internal vulnerability scans?

Options:

A.

They must be performed after a significant change

B.

They must be performed by an Approved Scanning Vendor (ASV)

C.

They must be performed by QSA personnel

D.

They must be performed at least annually

Question 4

What is the intent of classifying media that contains cardholder data?

Options:

A.

Ensuring that media is property protected according to the sensitivity of the data it contains

B.

Ensuring that media containing cardholder data is moved from secured areas an a quarterly basis

C.

Ensuring that media is clearly and visibly labeled as 'Confidential so all personnel know that the media contains cardholder data

D.

Ensuring that all media is consistently destroyed on the same schedule regardless of the contents

Question 5

A network firewall has been configured with the latest vendor security patches What additional configuration is needed to harden the firewall?

Options:

A.

Remove the default 'Firewall Administrator account and create a shared account for firewall administrators to use.

B.

Configure the firewall to permit all traffic until additional rules are defined

C.

Synchronize the firewall rules with the other firewalls m the environment

D.

Disable any firewall functions that are not needed in production

Question 6

Which of the following statements is true whenever a cryptographic key is retired and replaced with a new key?

Options:

A.

The retired key must not be used for encryption operations

B.

Cryptographic key components from the retired key must be retained for 3 months before disposal

C.

A new key custodian must be assigned

D.

All data encrypted under the retired key must be securely destroyed

Question 7

An LDAP server providing authentication services to the cardholder data environment is

Options:

A.

in scope for PCI DSS.

B.

not in scope for PCI DSS

C.

in scope only if it stores processes or transmits cardholder data

D.

in scope only if it provides authentication services to systems in the DMZ

Question 8

If disk encryption is used to protect account data what requirement should be met for the disk encryption solution?

Options:

A.

Access to the disk encryption must be managed independently of the operating system access control mechanisms

B.

The disk encryption system must use the same user account authenticator as the operating system

C.

The decryption keys must be associated with the local user account database

D.

The decryption keys must be stored within the local user account database

Question 9

If an entity shares cardholder data with a TPSP, what activity is the entity required to perform'?

Options:

A.

The entity must conduct ASV scans on the TPSP's systems at least annually

B.

The entity must perform a risk assessment of the TPSP's environment at least quarterly.

C.

The entity must test the TPSP's incident response plan at least quarterly

D.

The entity must monitor the TPSP's PCI DSS compliance status at least annually

Question 10

Which of the following can be sampled for testing during a PCI DSS assessment?

Options:

A.

PCI DSS requirements and testing procedures.

B.

Compensating controls

C.

Business facilities and system components

D.

Security policies and procedures

Question 11

What does the PCI PTS standard cover?

Options:

A.

Point-of-interaction devices used to protect account data

B.

Secure coding practices for commercial payment applications.

C.

Development of strong cryptographic algorithms

D.

End-to-end encryption solutions for transmission of account data

Question 12

Which of the following is required to be included in an incident response plan?

Options:

A.

Procedures for notifying PCI SSC of the security incident

B.

Procedures for responding to the detection of unauthorized wireless access points

C.

Procedures for securely deleting incident response records immediately upon resolution of the incident

D.

Procedures for launching a reverse-attack on the individual(s) responsible for the security incident

Question 13

PCI DSS Requirement 12.7 requires screening and background checks for which of the following?

Options:

A.

All personnel employed by the organization

B.

Personnel with access to the cardholder data environment.

C.

Visitors with access to the organization s facilities

D.

Cashiers with access to one card number at a time

Question 14

Which systems must have anti-malware solutions'

Options:

A.

All CDE systems, connected systems. NSCs. and security-providing systems

B.

All portable electronic storage

C.

All systems that store PAN

D.

Any in-scope system except for those identified as not at risk from malware

Question 15

Which of the following is true regarding compensating controls?

Options:

A.

A compensating control is not necessary if all other PCI DSS requirements are in place

B.

A compensating control must address the risk associated with not adhering to the PCI DSS requirement

C.

An existing PCI DSS requirement can be used as compensating control if it is already implemented

D.

A compensating control worksheet is not required if the acquirer approves the compensating control

Question 16

According to requirement 1, what is the purpose of "Network Security Controls?

Options:

A.

Manage anti-malware throughout the CDE.

B.

Control network traffic between two or more logical or physical network segments.

C.

Discover vulnerabilities and rank them

D.

Encrypt PAN when stored

Question 17

A retail merchant has a server room containing systems that store encrypted PAN data. The merchant has implemented a badge access-control system that identities who entered and exited the room on what date and at what time There are no video cameras located in the server room Based on this information, which statement is true regarding PCI DSS physical security requirements?

Options:

A.

The badge access-control system must be protected from tampering or disabling

B.

The merchant must install video cameras in addition to the existing access-control system

C.

Data from the access-control system must be securely deleted on a monthly basis

D.

The merchant must install motion-sensing alarms in addition to the existing access-control system

Question 18

An entity wants to know if the Software Security Framework can be leveraged during their assessment Which of the following software types would this apply to?

Options:

A.

Any payment software in the CDE

B.

Only software which runs on PCI PTS devices

C.

Validated Payment Applications that are listed by PCI SSC and have undergone a PA-DSS assessment

D.

Software developed by the entity in accordance with the Secure SLC Standard