Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

PCI SSC QSA_New_V4 Qualified Security Assessor V4 Exam Exam Practice Test

Demo: 22 questions
Total 75 questions

Qualified Security Assessor V4 Exam Questions and Answers

Question 1

Which systems must have anti-malware solutions?

Options:

A.

All CDE systems, connected systems, NSCs, and security-providing systems.

B.

All portable electronic storage.

C.

All systems that store PAN.

D.

Any in-scope system except for those identified as ‘not at risk’ from malware.

Question 2

Assigning a unique ID to each person is intended to ensure?

Options:

A.

Strong passwords are used for each user account.

B.

Shared accounts are only used by administrators.

C.

Individual users are accountable for their own actions.

D.

Access is assigned to group accounts based on need-to-know.

Question 3

Which statement about PAN is true?

Options:

A.

It must be protected with strong cryptography for transmission over private wireless networks.

B.

It must be protected with strong cryptography for transmission over private wired networks.

C.

It does not require protection for transmission over public wireless networks.

D.

It does not require protection for transmission over public wired networks.

Question 4

PCI DSS Requirement 12.7 requires screening and background checks for which of the following?

Options:

A.

All personnel employed by the organization.

B.

Personnel with access to the cardholder data environment.

C.

Visitors with access to the organization’s facilities.

D.

Cashiers with access to one card number at a time.

Question 5

Which of the following statements is true regarding track equivalent data on the chip of a payment card?

Options:

A.

It is allowed to be stored by merchants after authorization, if encrypted.

B.

It is sensitive authentication data.

C.

It is out of scope for PCI DSS.

D.

It is not applicable for PCI DSS Requirement 3.2.

Question 6

Which of the following meets the definition of “quarterly” as indicated in the description of timeframes used in PCI DSS requirements?

Options:

A.

Occurring at some point in each quarter of a year.

B.

At least once every 95–97 days.

C.

On the 15th of each third month.

D.

On the 1st of each fourth month.

Question 7

Which of the following file types must be monitored by a change-detection mechanism (for example, a file-integrity monitoring tool)?

Options:

A.

Application vendor manuals

B.

Files that regularly change

C.

Security policy and procedure documents

D.

System configuration and parameter files

Question 8

Which statement is true regarding the presence of both hashed and truncated versions of the same PAN in an environment?

Options:

A.

Controls are needed to prevent the original PAN being exposed by the hashed and truncated versions.

B.

The hashed version of the PAN must also be truncated per PCI DSS requirements for strong cryptography.

C.

The hashed and truncated versions must be correlated so the source PAN can be identified.

D.

Hashed and truncated versions of a PAN must not exist in same environment.

Question 9

A network firewall has been configured with the latest vendor security patches. What additional configuration Is needed to harden the firewall?

Options:

A.

Remove the default "Firewall Administrator account and create a shared account for firewall administrators to use.

B.

Configure the firewall to permit all traffic until additional rules are defined.

C.

Synchronize the firewall rules with the other firewalls in the environment.

D.

Disable any firewall functions that are not needed in production.

Question 10

Which of the following is required to be included in an incident response plan?

Options:

A.

Procedures for notifying PCI SSC of the security incident.

B.

Procedures for responding to the detection of unauthorized wireless access points.

C.

Procedures for securely deleting incident response records immediately upon resolution of the incident.

D.

Procedures for launching a reverse-attack on the individual(s) responsible for the security incident.

Question 11

Which statement about the Attestation of Compliance (AOC) is correct?

Options:

A.

There are different AOC templates for service providers and merchants.

B.

The AOC must be signed by both the merchant/service provider and by PCI SSC.

C.

The same AOC template is used W ROCs and SAQs.

D.

The AOC must be signed by either the merchant/service provider or the QSA/ISA.

Question 12

Which scenario meets PCI DSS requirements for restricting access to databases containing cardholder data?

Options:

A.

User access to the database is only through programmatic methods.

B.

User access to the database is restricted to system and network administrators.

C.

Application IDs for database applications can only be used by database administrators.

D.

Direct queries to the database are restricted to shared database administrator accounts.

Question 13

Viewing of audit log files should be limited to?

Options:

A.

Individuals who performed the logged activity.

B.

Individuals with read/write access.

C.

Individuals with administrator privileges.

D.

Individuals with a job-related need.

Question 14

An entity wants to know if the Software Security Framework can be leveraged during their assessment. Which of the following software types would this apply to?

Options:

A.

Any payment software in the CDE.

B.

Only software which runs on PCI PTS devices.

C.

Validated Payment Applications that are listed by PCI SSC and have undergone a PA-DSS assessment.

D.

Software developed by the entity in accordance with the Secure SLC Standard.

Question 15

Which systems must have anti-malware solutions?

Options:

A.

All CDE systems, connected systems. NSCs, and security-providing systems.

B.

All portable electronic storage.

C.

All systems that store PAN.

D.

Any in-scope system except for those identified as 'not at risk' from malware.

Question 16

Where can live PANs be used for testing?

Options:

A.

Production (live) environments only.

B.

Pre-production (test) environments only if located outside the CDE.

C.

Pre-production environments that are located within the CDE.

D.

Testing with live PANs must only be performed in the QSA Company environment.

Question 17

Which of the following describes the intent of installing one primary function per server?

Options:

A.

To allow functions with different security levels to be implemented on the same server.

B.

To prevent server functions with a lower security level from introducing security weaknesses to higher-security functions on the same server.

C.

To allow higher-security functions to protect lower-security functions installed on the same server.

D.

To reduce the security level of functions with higher-security needs to meet the needs of lower-security functions.

Question 18

Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?

Options:

A.

Routers that monitor network traffic flows between the CDE and out-of-scope networks.

B.

Firewalls that log all network traffic flows between the CDE and out-of-scope networks.

C.

Virtual LANs that route network traffic between the CDE and out-of-scope networks.

D.

A network configuration that prevents all network traffic between the CDE and out-of-scope networks.

Question 19

An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA, while also ensuring that the customized control is implemented securely. Which of the following statements is true?

Options:

A.

You can assess the customized control, but another assessor must verify that you completed the TRA correctly.

B.

You can assess the customized control and verify that the customized approach was correctly followed, but you must document this in the ROC.

C.

You must document the work on the customized control in the ROC, but you can not assess the control or the documentation.

D.

Assessors are not allowed to assist an entity with the completion of the Controls Matrix or the TRA.

Question 20

Which of the following is true regarding internal vulnerability scans?

Options:

A.

They must be performed after a significant change.

B.

They must be performed by an Approved Scanning Vendor (ASV).

C.

They must be performed by QSA personnel.

D.

They must be performed at least annually.

Question 21

Could an entity use both the Customized Approach and the Defined Approach to meet the same requirement?

Options:

A.

No, because a single approach must be selected.

B.

No, because only compensating controls can be used with the Defined Approach.

C.

Yes, if the entity uses no compensating controls.

D.

Yes, if the entity is eligible to use both approaches.

Question 22

Which of the following parties is responsible for completion of the Controls Matrix for the Customized Approach?

Options:

A.

Only a Qualified Security Assessor (QSA).

B.

Either a QSA, AQSA, or PCIP.

C.

Entity being assessed.

D.

Card brands or acquirer.

Demo: 22 questions
Total 75 questions