Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Assessor_New_V4 Exam Dumps - Assessor_New_V4 Exam

Go to page:
Question # 4

Where an entity under assessment is using the customized approach, which of the following steps is the responsibility of the assessor?

A.

Monitor the control.

B.

Derive testing procedures and document them in Appendix E of the ROC.

C.

Document and maintain evidence about each customized control as defined in Appendix E of PCI DSS

D.

Perform the targeted risk analysis as per PCI DSS requirement 12.3.2

Full Access
Question # 5

Assigning a unique ID to each person is intended to ensure?

A.

Strong passwords are used for each user account

B.

Shared accounts are only used by administrators

C.

Individual users are accountable for their own actions

D.

Access is assigned to group accounts based on need-to-know

Full Access
Question # 6

Which of the following statements is true regarding track equivalent data on the chip of a payment card?

A.

It is allowed to be stored by merchants after authorization if encrypted

B.

It is sensitive authentication data

C.

It is out of scope for PCI DSS

D.

It is not applicable for PCI DSS Requirement 3.2

Full Access
Question # 7

Which statement about the Attestation of Compliance (AOC) is correct?

A.

There are different AOC templates for service providers and merchants

B.

The AOC must be signed by both the merchant/service provider and by PCI SSC

C.

The same AOC template is used for ROCs and SAQs

D.

The AOC must be signed by either the merchant service provider or the QSA'ISA

Full Access
Question # 8

Which statement is true regarding the use of intrusion detection techniques, such as intrusion detection systems and/or intrusion protection systems (IDS'IPS)?

A.

Intrusion detection techniques are required on all system components

B.

Intrusion detection techniques are required to alert personnel of suspected compromises

C.

Intrusion detection techniques are required to isolate systems in the cardholder data environment from all other systems

D.

Intrusion detection techniques are required to identify all instances of cardholder data

Full Access
Go to page: