New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

QSA_New_V4 Exam Dumps - Qualified Security Assessor V4 Exam

Go to page:
Question # 4

Which statement is true regarding the PCI DSS Report on Compliance (ROC)?

A.

The ROC Reporting Template and instructions provided by PCI SSC should be used for all ROCs.

B.

The assessor may use either their own template or the ROC Reporting Template provided by PCI SSC.

C.

The assessor must create their own ROC template tor each assessment report.

D.

The ROC Reporting Template provided by PCI SSC is only required for service provider assessments.

Full Access
Question # 5

At which step in the payment transaction process does the merchant's bank pay the merchant for the purchase, and the cardholder's bank bill the cardholder?

A.

Authorization

B.

Clearing

C.

Settlement

D.

Chargeback

Full Access
Question # 6

Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?

A.

Routers that monitor network traffic flows between the CDE and out-of-scope networks.

B.

Firewalls that log all network traffic flows between the CDE and out-of-scope networks.

C.

Virtual LANs that route network traffic between the CDE and out-of-scope networks.

D.

A network configuration that prevents all network traffic between the CDE and out-of-scope networks.

Full Access
Question # 7

Could an entity use both the Customized Approach and the Defined Approach to meet the same requirement?

A.

No,because a single approach must be selected.

B.

No,because only compensating controls can be used with the Defined Approach.

C.

Yes, if the entity uses no compensating controls.

D.

Yes, if the entity is eligible to use both approaches.

Full Access
Question # 8

What must be included in an organization's procedures for managing visitors?

A.

Visitors are escorted at all times within areas where cardholder data is processed or maintained.

B.

Visitor badges are identical to badges used by onsite personnel.

C.

Visitor log includes visitor name, address, and contact phone number.

D.

Visitors retain their identification (for example, a visitor badge) for 30 days after completion of the visit.

Full Access
Go to page: