Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

PCI SSC Assessor_New_V4 Dumps

Assessor_New_V4 Questions and Answers

Question 1

Which of the following describes "stateful responses' to communication initiated by a trusted network?

Options:

A.

Administrative access to respond to requests to change the firewall is limited to one individual at a time

B.

Active network connections are tracked so that invalid response' traffic can be identified.

C.

A current baseline of application configurations is maintained and any mis-configuration is responded to promptly

D.

Logs of user activity on the firewall are correlated to identify and respond to suspicious behavior

Question 2

Which statement is true regarding the presence of both hashed and truncated versions of the same PAN in an environment?

Options:

A.

Controls are needed to prevent the original PAN being exposed by the hashed and truncated versions

B.

The hashed version of the PAN must also be truncated per PCI OSS requirements for strong cryptography.

C.

The hashed and truncated versions must be correlated so the source PAN can be identified

D.

Hashed and truncated versions of a PAN must not exist in same environment

Question 3

A "Partial Assessment is a new assessment result What is a ‘Partial Assessment’?

Options:

A.

A ROC that has been completed after using an SAQ to determine which requirements should be tested. As per FAQ 1331. (As long as the entity meets the SAQs eligibility criteria)

B.

An interim result before the final ROC has been completed

C.

A term used by payment brands and acquirers to describe entities that have multiple payment channels with each channel having its own assessment

D.

An assessment with at least one requirement marked as Not Tested”

Question 4

What is the intent of classifying media that contains cardholder data?

Options:

A.

Ensuring that media is property protected according to the sensitivity of the data it contains

B.

Ensuring that media containing cardholder data is moved from secured areas an a quarterly basis

C.

Ensuring that media is clearly and visibly labeled as 'Confidential so all personnel know that the media contains cardholder data

D.

Ensuring that all media is consistently destroyed on the same schedule regardless of the contents

Question 5

Security policies and operational procedures should be?

Options:

A.

Encrypted with strong cryptography

B.

Stored securely so that only management has access

C.

Reviewed and updated at least quarterly

D.

Distributed to and understood by all affected parties

Question 6

In the ROC Repotting Template, which of the following is the best approach for a response where the requirement was in Place’’?

Options:

A.

Details of the entity s project plan for implementing the requirement

B.

Details of how the assessor observed the entity s systems were compliant with the requirement

C.

Details of the entity s reason for not implementing the requirement

D.

Details of how the assessor observed the entity s systems were not compliant with the requirement

Question 7

Which scenario meets PCI DSS requirements for restricting access to databases containing cardholder data?

Options:

A.

User access to the database is only through programmatic methods

B.

User access to the database is restricted to system and network administrators

C.

Application IDs for database applications can only be used by database administrators

D.

Direct queries to the database are restricted to shared database administrator accounts

Question 8

If segmentation is being used to reduce the scope of a PCI DSS assessment the assessor will?

Options:

A.

Verify the segmentation controls allow only necessary traffic into the cardholder data environment.

B.

Verify the payment card brands have approved the segmentation

C.

Verify that approved devices and applications are used for the segmentation controls

D.

Verify the controls used for segmentation are configured properly and functioning as intended

Question 9

Which of the following is true regarding internal vulnerability scans?

Options:

A.

They must be performed after a significant change

B.

They must be performed by an Approved Scanning Vendor (ASV)

C.

They must be performed by QSA personnel

D.

They must be performed at least annually

Question 10

A network firewall has been configured with the latest vendor security patches What additional configuration is needed to harden the firewall?

Options:

A.

Remove the default 'Firewall Administrator account and create a shared account for firewall administrators to use.

B.

Configure the firewall to permit all traffic until additional rules are defined

C.

Synchronize the firewall rules with the other firewalls m the environment

D.

Disable any firewall functions that are not needed in production

Question 11

Which of the following types of events is required to be logged?

Options:

A.

All use of end-user messaging technologies

B.

All access to external web sites

C.

All access to all audit trails

D.

All network transmissions

Question 12

Which statement about the Attestation of Compliance (AOC) is correct?

Options:

A.

There are different AOC templates for service providers and merchants

B.

The AOC must be signed by both the merchant/service provider and by PCI SSC

C.

The same AOC template is used for ROCs and SAQs

D.

The AOC must be signed by either the merchant service provider or the QSA'ISA

Question 13

The intent of assigning a risk ranking to vulnerabilities is to?

Options:

A.

Ensure all vulnerabilities are addressed within 30 days

B.

Replace the need to quarterly ASV scans

C.

Prioritize the highest risk items so they can be addressed more quickly

D.

Ensure that critical security patches are installed at least quarterly

Question 14

Which of the following is required to be included in an incident response plan?

Options:

A.

Procedures for notifying PCI SSC of the security incident

B.

Procedures for responding to the detection of unauthorized wireless access points

C.

Procedures for securely deleting incident response records immediately upon resolution of the incident

D.

Procedures for launching a reverse-attack on the individual(s) responsible for the security incident

Question 15

Which of the following statements is true regarding track equivalent data on the chip of a payment card?

Options:

A.

It is allowed to be stored by merchants after authorization if encrypted

B.

It is sensitive authentication data

C.

It is out of scope for PCI DSS

D.

It is not applicable for PCI DSS Requirement 3.2

Question 16

An organization has implemented a change-detection mechanism on their systems. How often must critical file comparisons be performed?

Options:

A.

At least weekly

B.

Periodically as defined by the entity

C.

Only after a valid change is installed

D.

At least monthly

Question 17

A retail merchant has a server room containing systems that store encrypted PAN data. The merchant has implemented a badge access-control system that identities who entered and exited the room on what date and at what time There are no video cameras located in the server room Based on this information, which statement is true regarding PCI DSS physical security requirements?

Options:

A.

The badge access-control system must be protected from tampering or disabling

B.

The merchant must install video cameras in addition to the existing access-control system

C.

Data from the access-control system must be securely deleted on a monthly basis

D.

The merchant must install motion-sensing alarms in addition to the existing access-control system

Question 18

Which statement is true regarding the use of intrusion detection techniques, such as intrusion detection systems and/or intrusion protection systems (IDS'IPS)?

Options:

A.

Intrusion detection techniques are required on all system components

B.

Intrusion detection techniques are required to alert personnel of suspected compromises

C.

Intrusion detection techniques are required to isolate systems in the cardholder data environment from all other systems

D.

Intrusion detection techniques are required to identify all instances of cardholder data