New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

PCI SSC Assessor_New_V4 Assessor_New_V4 Exam Exam Practice Test

Demo: 18 questions
Total 60 questions

Assessor_New_V4 Exam Questions and Answers

Question 1

A sample of business facilities is reviewed during the PCI DSS assessment What is the assessor required to validate about the sample?

Options:

A.

It includes a consistent set of facilities that are reviewed for all assessments.

B.

The number of facilities in the sample is at least 10 percent of the total number of facilities

C.

Every facility where cardholder data is stored is reviewed

D.

All types and locations of facilities are represented

Question 2

According to requirement 1, what is the purpose of "Network Security Controls?

Options:

A.

Manage anti-malware throughout the CDE.

B.

Control network traffic between two or more logical or physical network segments.

C.

Discover vulnerabilities and rank them

D.

Encrypt PAN when stored

Question 3

Which scenario meets PCI DSS requirements for critical systems to have correct and consistent time?

Options:

A.

Each internal system is configured to be its own time server.

B.

Access to time configuration settings is available to all users of the system.

C.

Central time servers receive time signals from specific, approved external sources

D.

Each internal system peers directory with an external source to ensure accuracy of time updates

Question 4

If segmentation is being used to reduce the scope of a PCI DSS assessment the assessor will?

Options:

A.

Verify the segmentation controls allow only necessary traffic into the cardholder data environment.

B.

Verify the payment card brands have approved the segmentation

C.

Verify that approved devices and applications are used for the segmentation controls

D.

Verify the controls used for segmentation are configured properly and functioning as intended

Question 5

Which systems must have anti-malware solutions'

Options:

A.

All CDE systems, connected systems. NSCs. and security-providing systems

B.

All portable electronic storage

C.

All systems that store PAN

D.

Any in-scope system except for those identified as not at risk from malware

Question 6

Where an entity under assessment is using the customized approach, which of the following steps is the responsibility of the assessor?

Options:

A.

Monitor the control.

B.

Derive testing procedures and document them in Appendix E of the ROC.

C.

Document and maintain evidence about each customized control as defined in Appendix E of PCI DSS

D.

Perform the targeted risk analysis as per PCI DSS requirement 12.3.2

Question 7

The intent of assigning a risk ranking to vulnerabilities is to?

Options:

A.

Ensure all vulnerabilities are addressed within 30 days

B.

Replace the need to quarterly ASV scans

C.

Prioritize the highest risk items so they can be addressed more quickly

D.

Ensure that critical security patches are installed at least quarterly

Question 8

What does the PCI PTS standard cover?

Options:

A.

Point-of-interaction devices used to protect account data

B.

Secure coding practices for commercial payment applications.

C.

Development of strong cryptographic algorithms

D.

End-to-end encryption solutions for transmission of account data

Question 9

Which of the following is true regarding internal vulnerability scans?

Options:

A.

They must be performed after a significant change

B.

They must be performed by an Approved Scanning Vendor (ASV)

C.

They must be performed by QSA personnel

D.

They must be performed at least annually

Question 10

Which of the following describes "stateful responses' to communication initiated by a trusted network?

Options:

A.

Administrative access to respond to requests to change the firewall is limited to one individual at a time

B.

Active network connections are tracked so that invalid response' traffic can be identified.

C.

A current baseline of application configurations is maintained and any mis-configuration is responded to promptly

D.

Logs of user activity on the firewall are correlated to identify and respond to suspicious behavior

Question 11

What would be an appropriate strength for the key-encrypting key (KEK) used to protect an AES 128-bit data-encrypting key (DEK)

Options:

A.

DES256

B.

RSA512

C.

AES 128

D.

ROT 13

Question 12

An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA. while also ensuing that the customized control is implemented securely. Which of the following statements is true?

Options:

A.

You can assess the customized control but another assessor must verify that you completed the TRA correctly.

B.

You can assess the customized control and verify that the customized approach was correctly followed but you must document this in the ROC.

C.

You must document the work on the customized control in the ROC but you can not assess the control or the documentation.

D.

Assessors are not allowed to assist an entity with the completion of the Controls Matrix or the TRA.

Question 13

Which scenario meets PCI DSS requirements for restricting access to databases containing cardholder data?

Options:

A.

User access to the database is only through programmatic methods

B.

User access to the database is restricted to system and network administrators

C.

Application IDs for database applications can only be used by database administrators

D.

Direct queries to the database are restricted to shared database administrator accounts

Question 14

Which statement is true regarding the use of intrusion detection techniques, such as intrusion detection systems and/or intrusion protection systems (IDS'IPS)?

Options:

A.

Intrusion detection techniques are required on all system components

B.

Intrusion detection techniques are required to alert personnel of suspected compromises

C.

Intrusion detection techniques are required to isolate systems in the cardholder data environment from all other systems

D.

Intrusion detection techniques are required to identify all instances of cardholder data

Question 15

What is the intent of classifying media that contains cardholder data?

Options:

A.

Ensuring that media is property protected according to the sensitivity of the data it contains

B.

Ensuring that media containing cardholder data is moved from secured areas an a quarterly basis

C.

Ensuring that media is clearly and visibly labeled as 'Confidential so all personnel know that the media contains cardholder data

D.

Ensuring that all media is consistently destroyed on the same schedule regardless of the contents

Question 16

Which of the following is an example of multi-factor authentication?

Options:

A.

A token that must be presented twice during the login process

B.

A user passphrase and an application level password.

C.

A user password and a PIN-activated smart card

D.

A user fingerprint and a user thumbprint

Question 17

Which of the following file types must be monitored by a change-detection mechanism (for example, a file-integrity monitoring tool)?

Options:

A.

Application vendor manuals

B.

Files that regularly change

C.

Security policy and procedure documents

D.

System configuration and parameter files

Question 18

An entity accepts e-commerce payment card transactions and stores account data in a database The database server and the web server are both accessible from the Internet The database server and the web server are on separate physical servers. What is required for the entity to meet PCI DSS requirements7

Options:

A.

The web server and the database server should be installed on the same physical server

B.

The database server should be relocated so that it is not accessible from untrusted networks

C.

The web server should be moved into the internal network

D.

The database server should be moved to a separate segment from the web server to allow for more concurrent connections

Demo: 18 questions
Total 60 questions