New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

PCI SSC QSA_New_V4 Qualified Security Assessor V4 Exam Exam Practice Test

Page: 1 / 4
Total 40 questions

Qualified Security Assessor V4 Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

What do PCI DSS requirements for protecting cryptographic keys include?

Options:

A.

Public keys must be encrypted with a key-encrypting key.

B.

Data-encrypting keys must be stronger than the key-encrypting key that protects it.

C.

Private or secret keys must be encrypted, stored within an SCD, or stored as key components.

D.

Key-encrypting keys and data-encrypting keys must be assigned to the same key custodian.

Question 2

Which scenario meets PCI DSS requirements for restricting access to databases containing cardholder data?

Options:

A.

User access to the database Is only through programmatic methods.

B.

User access to the database Is restricted to system and network administrators.

C.

Application IDs for database applications can only be used by database administrators.

D.

Direct queries to the database are restricted to shared database administrator accounts.

Question 3

Which of the following describes "stateful responses" to communication Initiated by a trusted network?

Options:

A.

Administrative access to respond to requests to change the firewall Is limited to one individual at a time.

B.

Active network connections are tracked so that invalid "response" traffic can be identified.

C.

A current baseline of application configurations is maintained and any mis-configuration is responded to promptly.

D.

Logs of user activity on the firewall are correlated to identify and respond to suspicious behavior.

Question 4

Which statement is true regarding the use of intrusion detection techniques, such as intrusion detection systems and/or Intrusion protection systems (IDS/IPS)?

Options:

A.

Intrusion detection techniques are required on all system components.

B.

Intrusion detection techniques are required to alert personnel of suspected compromises.

C.

Intrusion detection techniques are required to isolate systems in the cardholder data environment from all other systems

D.

Intrusion detection techniques are required to identify all instances of cardholder data.

Question 5

In accordance with PCI DSS Requirement 10, how long must audit logs be retained?

Options:

A.

At least 1 year, with the most recent 3 months immediately available.

B.

At least 2 years, with the most recent 3 months immediately available.

C.

At least 2 years, with the most recent month immediately available.

D.

At least 3 months, with the most recent month immediately available.

Question 6

An organization has implemented a change-detection mechanism on their systems. How often must critical file comparisons be performed?

Options:

A.

At least weekly

B.

Periodically as defined by the entity

C.

Only after a valid change is installed

D.

At least monthly

Question 7

An entity wants to know if the Software Security Framework can be leveraged during their assessment. Which of the following software types would this apply to?

Options:

A.

Any payment software In the CDE.

B.

Only software which runs on PCI PTS devices.

C.

Validated Payment Applications that are listed by PCI SSC and have undergone a PA-DSS assessment.

D.

Software developed by the entity in accordance with the Secure SLC Standard.

Question 8

Where an entity under assessment is using the customized approach, which of the following steps is the responsibility of the assessor?

Options:

A.

Monitor the control.

B.

Derive testing procedures and document them in Appendix E of the ROC.

C.

Document and maintain evidence about each customized control as defined in Appendix E of PCI DSS.

D.

Perform the targeted risk analysis as per PCI DSS requirement 12.3.2.

Question 9

Viewing of audit log files should be limited to?

Options:

A.

Individuals who performed the logged activity.

B.

Individuals with read/write access.

C.

Individuals with administrator privileges.

D.

Individuals with a job-related need.

Question 10

What does the PCI PTS standard cover?

Options:

A.

Point-of-Interaction devices used to protect account data.

B.

Secure coding practices for commercial payment applications.

C.

Development of strong cryptographic algorithms.

D.

End-lo-end encryption solutions for transmission of account data.

Question 11

If segmentation is being used to reduce the scope of a PCI DSS assessment, the assessor will?

Options:

A.

Verify the segmentation controls allow only necessary traffic Into the cardholder data environment.

B.

Verify the payment card brands have approved the segmentation.

C.

Verify that approved devices and applications are used for the segmentation controls.

D.

Verify the controls used for segmentation are configured properly and functioning as intended

Question 12

Which statement about the Attestation of Compliance (AOC) is correct?

Options:

A.

There are different AOC templates for service providers and merchants.

B.

The AOC must be signed by both the merchant/service provider and by PCI SSC.

C.

The same AOC template is used W ROCs and SAQs.

D.

The AOC must be signed by either the merchant/service provider or the QSA/ISA.

Page: 1 / 4
Total 40 questions