Weekend Sale Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

PCI SSC Assessor_New_V4 Assessor_New_V4 Exam Practice Test

Page: 1 / 6
Total 60 questions

Assessor_New_V4 Questions and Answers

Question 1

In accordance with PCI DSS Requirement 10. how long must audit logs be retained?

Options:

A.

At least 1 year, with the most recent 3 months immediately available

B.

At least 2 years, with the most recent 3 months immediately available

C.

At least 2 years with the most recent month immediately available

D.

At least 3 months with the most recent month immediately available

Question 2

If disk encryption is used to protect account data what requirement should be met for the disk encryption solution?

Options:

A.

Access to the disk encryption must be managed independently of the operating system access control mechanisms

B.

The disk encryption system must use the same user account authenticator as the operating system

C.

The decryption keys must be associated with the local user account database

D.

The decryption keys must be stored within the local user account database

Question 3

Which of the following statements is true regarding track equivalent data on the chip of a payment card?

Options:

A.

It is allowed to be stored by merchants after authorization if encrypted

B.

It is sensitive authentication data

C.

It is out of scope for PCI DSS

D.

It is not applicable for PCI DSS Requirement 3.2

Question 4

Assigning a unique ID to each person is intended to ensure?

Options:

A.

Strong passwords are used for each user account

B.

Shared accounts are only used by administrators

C.

Individual users are accountable for their own actions

D.

Access is assigned to group accounts based on need-to-know

Question 5

What must the assessor verify when testing that PAN is protected whenever it is sent over the Internet?

Options:

A.

The security protocol is configured to support earlier versions

B.

The PAN is encrypted with strong cryptography

C.

The security protocol is configured to accept all digital certificates

D.

The PAN is securely deleted once the transmission has been sent

Question 6

What must be included m an organization’s procedures for managing visitors?

Options:

A.

Visitors are escorted at all times within areas where cardholder data is processed or maintained

B.

Visitor badges are identical to badges used by onsite personnel

C.

Visitor log includes visitor name, address, and contact phone number

D.

Visitors retain their identification (for example a visitor badge) for 30 days after completion of the visit

Question 7

What do PCI DSS requirements for protecting cryptographic keys include?

Options:

A.

Public keys must be encrypted with a key-encrypting key.

B.

Data-encrypting keys must be stronger than the key-encrypting key that protects it.

C.

Private or secret keys must be encrypted, stored within an SCD or stored as key components

D.

Key-encrypting keys and data-encrypting keys must be assigned to the same key custodian

Question 8

Which of the following describes "stateful responses' to communication initiated by a trusted network?

Options:

A.

Administrative access to respond to requests to change the firewall is limited to one individual at a time

B.

Active network connections are tracked so that invalid response' traffic can be identified.

C.

A current baseline of application configurations is maintained and any mis-configuration is responded to promptly

D.

Logs of user activity on the firewall are correlated to identify and respond to suspicious behavior

Question 9

An entity accepts e-commerce payment card transactions and stores account data in a database The database server and the web server are both accessible from the Internet The database server and the web server are on separate physical servers. What is required for the entity to meet PCI DSS requirements7

Options:

A.

The web server and the database server should be installed on the same physical server

B.

The database server should be relocated so that it is not accessible from untrusted networks

C.

The web server should be moved into the internal network

D.

The database server should be moved to a separate segment from the web server to allow for more concurrent connections

Question 10

An entity wants to know if the Software Security Framework can be leveraged during their assessment Which of the following software types would this apply to?

Options:

A.

Any payment software in the CDE

B.

Only software which runs on PCI PTS devices

C.

Validated Payment Applications that are listed by PCI SSC and have undergone a PA-DSS assessment

D.

Software developed by the entity in accordance with the Secure SLC Standard

Question 11

According to requirement 1, what is the purpose of "Network Security Controls?

Options:

A.

Manage anti-malware throughout the CDE.

B.

Control network traffic between two or more logical or physical network segments.

C.

Discover vulnerabilities and rank them

D.

Encrypt PAN when stored

Question 12

Security policies and operational procedures should be?

Options:

A.

Encrypted with strong cryptography

B.

Stored securely so that only management has access

C.

Reviewed and updated at least quarterly

D.

Distributed to and understood by all affected parties

Question 13

The intent of assigning a risk ranking to vulnerabilities is to?

Options:

A.

Ensure all vulnerabilities are addressed within 30 days

B.

Replace the need to quarterly ASV scans

C.

Prioritize the highest risk items so they can be addressed more quickly

D.

Ensure that critical security patches are installed at least quarterly

Question 14

According to the glossary, bespoke and custom software describes which type of software?

Options:

A.

Any software developed by a third party

B.

Any software developed by a third party that can be customized by an entity.

C.

Software developed by an entity for the entity's own use

D.

Virtual payment terminals

Question 15

Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?

Options:

A.

Routers that monitor network traffic flows between the CDE and out-of-scope networks

B.

Firewalls that log all network traffic flows between the CDE and out of-scope networks

C.

Virtual LANs that route network traffic between the CDE and out-of-scope networks

D.

A network configuration that prevents all network traffic between the CDE and out-of-scope networks

Question 16

Which of the following can be sampled for testing during a PCI DSS assessment?

Options:

A.

PCI DSS requirements and testing procedures.

B.

Compensating controls

C.

Business facilities and system components

D.

Security policies and procedures

Question 17

A sample of business facilities is reviewed during the PCI DSS assessment What is the assessor required to validate about the sample?

Options:

A.

It includes a consistent set of facilities that are reviewed for all assessments.

B.

The number of facilities in the sample is at least 10 percent of the total number of facilities

C.

Every facility where cardholder data is stored is reviewed

D.

All types and locations of facilities are represented

Question 18

Which of the following is a requirement for multi-tenant service providers?

Options:

A.

Ensure that customers cannot access another entity s cardholder data environment

B.

Provide customers with access to the hosting provider s system configuration files.

C.

Provide customers with a shared user ID for access to critical system binaries

D.

Ensure that a customer's log files are available to all hosted entities

Page: 1 / 6
Total 60 questions