Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Assessor_New_V4 Exam Dumps - Assessor_New_V4 Exam

Go to page:
Question # 9

Which of the following types of events is required to be logged?

A.

All use of end-user messaging technologies

B.

All access to external web sites

C.

All access to all audit trails

D.

All network transmissions

Full Access
Question # 10

According to requirement 1, what is the purpose of "Network Security Controls?

A.

Manage anti-malware throughout the CDE.

B.

Control network traffic between two or more logical or physical network segments.

C.

Discover vulnerabilities and rank them

D.

Encrypt PAN when stored

Full Access
Question # 11

An organization has implemented a change-detection mechanism on their systems. How often must critical file comparisons be performed?

A.

At least weekly

B.

Periodically as defined by the entity

C.

Only after a valid change is installed

D.

At least monthly

Full Access
Question # 12

At which step in the payment transaction process does the merchants bank pay the merchant for the purchase and the cardholder s bank bill the cardholder?

A.

Authorization

B.

Clearing

C.

Settlement

D.

Chargeback

Full Access
Question # 13

Which of the following describes the intent of installing one primary function per server?

A.

To allow functions with different security levels to be implemented on the same server

B.

To prevent server functions with a lower security level from introducing security weaknesses to higher -security functions on the same server

C.

To allow higher-security functions to protect lower-security functions installed on the same server

D.

To reduce the security level of functions with higher-security needs to meet the needs of lower-security functions

Full Access
Question # 14

Where can live PANs be used for testing?

A.

Production (live) environments only

B.

Pre-production (test) environments only if located outside the CDE.

C.

Pre-production environments that are located within the CDE

D.

Testing with live PANs must only be performed in the QSA Company environment

Full Access
Question # 15

Which scenario meets PCI DSS requirements for restricting access to databases containing cardholder data?

A.

User access to the database is only through programmatic methods

B.

User access to the database is restricted to system and network administrators

C.

Application IDs for database applications can only be used by database administrators

D.

Direct queries to the database are restricted to shared database administrator accounts

Full Access
Question # 16

Viewing of audit log files should be limited to?

A.

Individuals who performed the logged activity

B.

Individuals with read/write access

C.

Individuals with administrator privileges

D.

Individuals with a job-related need

Full Access
Go to page: