Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Assessor_New_V4 Question and Answers

Assessor_New_V4

Last Update May 18, 2024
Total Questions : 60

We are offering FREE Assessor_New_V4 PCI SSC exam questions. All you do is to just go and sign up. Give your details, prepare Assessor_New_V4 free exam questions and then go for complete pool of Assessor_New_V4 test questions that will help you more.

Assessor_New_V4 pdf

Assessor_New_V4 PDF

$35  $99.99
Assessor_New_V4 Engine

Assessor_New_V4 Testing Engine

$42  $119.99
Assessor_New_V4 PDF + Engine

Assessor_New_V4 PDF + Testing Engine

$56  $159.99
Questions 1

An entity accepts e-commerce payment card transactions and stores account data in a database The database server and the web server are both accessible from the Internet The database server and the web server are on separate physical servers. What is required for the entity to meet PCI DSS requirements7

Options:

A.  

The web server and the database server should be installed on the same physical server

B.  

The database server should be relocated so that it is not accessible from untrusted networks

C.  

The web server should be moved into the internal network

D.  

The database server should be moved to a separate segment from the web server to allow for more concurrent connections

Discussion 0
Questions 2

A network firewall has been configured with the latest vendor security patches What additional configuration is needed to harden the firewall?

Options:

A.  

Remove the default 'Firewall Administrator account and create a shared account for firewall administrators to use.

B.  

Configure the firewall to permit all traffic until additional rules are defined

C.  

Synchronize the firewall rules with the other firewalls m the environment

D.  

Disable any firewall functions that are not needed in production

Discussion 0
Questions 3

Which of the following is a requirement for multi-tenant service providers?

Options:

A.  

Ensure that customers cannot access another entity s cardholder data environment

B.  

Provide customers with access to the hosting provider s system configuration files.

C.  

Provide customers with a shared user ID for access to critical system binaries

D.  

Ensure that a customer's log files are available to all hosted entities

Discussion 0
Questions 4

The intent of assigning a risk ranking to vulnerabilities is to?

Options:

A.  

Ensure all vulnerabilities are addressed within 30 days

B.  

Replace the need to quarterly ASV scans

C.  

Prioritize the highest risk items so they can be addressed more quickly

D.  

Ensure that critical security patches are installed at least quarterly

Discussion 0
Questions 5

A "Partial Assessment is a new assessment result What is a ‘Partial Assessment’?

Options:

A.  

A ROC that has been completed after using an SAQ to determine which requirements should be tested. As per FAQ 1331. (As long as the entity meets the SAQs eligibility criteria)

B.  

An interim result before the final ROC has been completed

C.  

A term used by payment brands and acquirers to describe entities that have multiple payment channels with each channel having its own assessment

D.  

An assessment with at least one requirement marked as Not Tested”

Discussion 0
Questions 6

Which statement is true regarding the use of intrusion detection techniques, such as intrusion detection systems and/or intrusion protection systems (IDS'IPS)?

Options:

A.  

Intrusion detection techniques are required on all system components

B.  

Intrusion detection techniques are required to alert personnel of suspected compromises

C.  

Intrusion detection techniques are required to isolate systems in the cardholder data environment from all other systems

D.  

Intrusion detection techniques are required to identify all instances of cardholder data

Discussion 0
Questions 7

Which of the following meets the definition of 'quarterly' as indicated in the description of timeframes used in PCI DSS requirements?

Options:

A.  

Occurring at some point in each quarter of a year

B.  

At least once every 95 97 days.

C.  

On the 15th of each third month

D.  

On the 1st of each fourth month

Discussion 0
Questions 8

Which of the following is true regarding compensating controls?

Options:

A.  

A compensating control is not necessary if all other PCI DSS requirements are in place

B.  

A compensating control must address the risk associated with not adhering to the PCI DSS requirement

C.  

An existing PCI DSS requirement can be used as compensating control if it is already implemented

D.  

A compensating control worksheet is not required if the acquirer approves the compensating control

Discussion 0
Questions 9

Which of the following describes the intent of installing one primary function per server?

Options:

A.  

To allow functions with different security levels to be implemented on the same server

B.  

To prevent server functions with a lower security level from introducing security weaknesses to higher -security functions on the same server

C.  

To allow higher-security functions to protect lower-security functions installed on the same server

D.  

To reduce the security level of functions with higher-security needs to meet the needs of lower-security functions

Discussion 0
Questions 10

Which of the following statements is true regarding track equivalent data on the chip of a payment card?

Options:

A.  

It is allowed to be stored by merchants after authorization if encrypted

B.  

It is sensitive authentication data

C.  

It is out of scope for PCI DSS

D.  

It is not applicable for PCI DSS Requirement 3.2

Discussion 0
Questions 11

What process is requited by PCI DSS for protecting card-reading devices at the point-of-sale?

Options:

A.  

Devices are periodically inspected to detect unauthorized card stammers.

B.  

The serial number of each device is periodically verified with the device manufacturer

C.  

Device identifiers and security labels are periodically replaced

D.  

Devices are physically destroyed if there is suspicion of compromise

Discussion 0
Questions 12

What would be an appropriate strength for the key-encrypting key (KEK) used to protect an AES 128-bit data-encrypting key (DEK)

Options:

A.  

DES256

B.  

RSA512

C.  

AES 128

D.  

ROT 13

Discussion 0
Questions 13

Passwords for default accounts and default administrative accounts should be?

Options:

A.  

Changed within 30 days after installing a system on the network.

B.  

Reset to the default password before installing a system on the network

C.  

Changed before installing a system on the network

D.  

Configured to expire in 30 days

Discussion 0
Questions 14

In the ROC Repotting Template, which of the following is the best approach for a response where the requirement was in Place’’?

Options:

A.  

Details of the entity s project plan for implementing the requirement

B.  

Details of how the assessor observed the entity s systems were compliant with the requirement

C.  

Details of the entity s reason for not implementing the requirement

D.  

Details of how the assessor observed the entity s systems were not compliant with the requirement

Discussion 0
Questions 15

Which of the following describes "stateful responses' to communication initiated by a trusted network?

Options:

A.  

Administrative access to respond to requests to change the firewall is limited to one individual at a time

B.  

Active network connections are tracked so that invalid response' traffic can be identified.

C.  

A current baseline of application configurations is maintained and any mis-configuration is responded to promptly

D.  

Logs of user activity on the firewall are correlated to identify and respond to suspicious behavior

Discussion 0
Questions 16

Which systems must have anti-malware solutions'

Options:

A.  

All CDE systems, connected systems. NSCs. and security-providing systems

B.  

All portable electronic storage

C.  

All systems that store PAN

D.  

Any in-scope system except for those identified as not at risk from malware

Discussion 0
Questions 17

Which statement about the Attestation of Compliance (AOC) is correct?

Options:

A.  

There are different AOC templates for service providers and merchants

B.  

The AOC must be signed by both the merchant/service provider and by PCI SSC

C.  

The same AOC template is used for ROCs and SAQs

D.  

The AOC must be signed by either the merchant service provider or the QSA'ISA

Discussion 0
Questions 18

Which of the following parties is responsible for completion of the Controls Matrix for the Customized Approach?

Options:

A.  

Only a Qualified Security Assessor (QSA)

B.  

Either a QSA, AQSA, or PClP.

C.  

Entity being assessed

D.  

Card brands or acquirer

Discussion 0