Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Assessor_New_V4 Exam Dumps - Assessor_New_V4 Exam

Question # 4

Where an entity under assessment is using the customized approach, which of the following steps is the responsibility of the assessor?

A.

Monitor the control.

B.

Derive testing procedures and document them in Appendix E of the ROC.

C.

Document and maintain evidence about each customized control as defined in Appendix E of PCI DSS

D.

Perform the targeted risk analysis as per PCI DSS requirement 12.3.2

Full Access
Question # 5

Assigning a unique ID to each person is intended to ensure?

A.

Strong passwords are used for each user account

B.

Shared accounts are only used by administrators

C.

Individual users are accountable for their own actions

D.

Access is assigned to group accounts based on need-to-know

Full Access
Question # 6

Which of the following statements is true regarding track equivalent data on the chip of a payment card?

A.

It is allowed to be stored by merchants after authorization if encrypted

B.

It is sensitive authentication data

C.

It is out of scope for PCI DSS

D.

It is not applicable for PCI DSS Requirement 3.2

Full Access
Question # 7

Which statement about the Attestation of Compliance (AOC) is correct?

A.

There are different AOC templates for service providers and merchants

B.

The AOC must be signed by both the merchant/service provider and by PCI SSC

C.

The same AOC template is used for ROCs and SAQs

D.

The AOC must be signed by either the merchant service provider or the QSA'ISA

Full Access
Question # 8

Which statement is true regarding the use of intrusion detection techniques, such as intrusion detection systems and/or intrusion protection systems (IDS'IPS)?

A.

Intrusion detection techniques are required on all system components

B.

Intrusion detection techniques are required to alert personnel of suspected compromises

C.

Intrusion detection techniques are required to isolate systems in the cardholder data environment from all other systems

D.

Intrusion detection techniques are required to identify all instances of cardholder data

Full Access
Question # 9

Which of the following types of events is required to be logged?

A.

All use of end-user messaging technologies

B.

All access to external web sites

C.

All access to all audit trails

D.

All network transmissions

Full Access
Question # 10

According to requirement 1, what is the purpose of "Network Security Controls?

A.

Manage anti-malware throughout the CDE.

B.

Control network traffic between two or more logical or physical network segments.

C.

Discover vulnerabilities and rank them

D.

Encrypt PAN when stored

Full Access
Question # 11

An organization has implemented a change-detection mechanism on their systems. How often must critical file comparisons be performed?

A.

At least weekly

B.

Periodically as defined by the entity

C.

Only after a valid change is installed

D.

At least monthly

Full Access
Question # 12

At which step in the payment transaction process does the merchants bank pay the merchant for the purchase and the cardholder s bank bill the cardholder?

A.

Authorization

B.

Clearing

C.

Settlement

D.

Chargeback

Full Access
Question # 13

Which of the following describes the intent of installing one primary function per server?

A.

To allow functions with different security levels to be implemented on the same server

B.

To prevent server functions with a lower security level from introducing security weaknesses to higher -security functions on the same server

C.

To allow higher-security functions to protect lower-security functions installed on the same server

D.

To reduce the security level of functions with higher-security needs to meet the needs of lower-security functions

Full Access
Question # 14

Where can live PANs be used for testing?

A.

Production (live) environments only

B.

Pre-production (test) environments only if located outside the CDE.

C.

Pre-production environments that are located within the CDE

D.

Testing with live PANs must only be performed in the QSA Company environment

Full Access
Question # 15

Which scenario meets PCI DSS requirements for restricting access to databases containing cardholder data?

A.

User access to the database is only through programmatic methods

B.

User access to the database is restricted to system and network administrators

C.

Application IDs for database applications can only be used by database administrators

D.

Direct queries to the database are restricted to shared database administrator accounts

Full Access
Question # 16

Viewing of audit log files should be limited to?

A.

Individuals who performed the logged activity

B.

Individuals with read/write access

C.

Individuals with administrator privileges

D.

Individuals with a job-related need

Full Access
Question # 17

Which systems must have anti-malware solutions'

A.

All CDE systems, connected systems. NSCs. and security-providing systems

B.

All portable electronic storage

C.

All systems that store PAN

D.

Any in-scope system except for those identified as not at risk from malware

Full Access
Question # 18

If disk encryption is used to protect account data what requirement should be met for the disk encryption solution?

A.

Access to the disk encryption must be managed independently of the operating system access control mechanisms

B.

The disk encryption system must use the same user account authenticator as the operating system

C.

The decryption keys must be associated with the local user account database

D.

The decryption keys must be stored within the local user account database

Full Access