Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free PCI SSC Assessor_New_V4 Practice Exam with Questions & Answers

Questions 1

An LDAP server providing authentication services to the cardholder data environment is

Options:
A.

in scope for PCI DSS.

B.

not in scope for PCI DSS

C.

in scope only if it stores processes or transmits cardholder data

D.

in scope only if it provides authentication services to systems in the DMZ

PCI SSC Assessor_New_V4 Premium Access
Questions 2

At which step in the payment transaction process does the merchants bank pay the merchant for the purchase and the cardholder s bank bill the cardholder?

Options:
A.

Authorization

B.

Clearing

C.

Settlement

D.

Chargeback

Questions 3

Which of the following meets the definition of 'quarterly' as indicated in the description of timeframes used in PCI DSS requirements?

Options:
A.

Occurring at some point in each quarter of a year

B.

At least once every 95 97 days.

C.

On the 15th of each third month

D.

On the 1st of each fourth month

Questions 4

An internal NTP server that provides time services to the Cardholder Data Environment is?

Options:
A.

Only in scope if it provides time services to database servers.

B.

Not in scope for PCI DSS

C.

Only m scope if it stores processes or transmits cardholder data

D.

In scope for PCI DSS

Questions 5

A network firewall has been configured with the latest vendor security patches What additional configuration is needed to harden the firewall?

Options:
A.

Remove the default 'Firewall Administrator account and create a shared account for firewall administrators to use.

B.

Configure the firewall to permit all traffic until additional rules are defined

C.

Synchronize the firewall rules with the other firewalls m the environment

D.

Disable any firewall functions that are not needed in production

Questions 6

Which of the following describes "stateful responses' to communication initiated by a trusted network?

Options:
A.

Administrative access to respond to requests to change the firewall is limited to one individual at a time

B.

Active network connections are tracked so that invalid response' traffic can be identified.

C.

A current baseline of application configurations is maintained and any mis-configuration is responded to promptly

D.

Logs of user activity on the firewall are correlated to identify and respond to suspicious behavior

Questions 7

Which scenario meets PCI DSS requirements for critical systems to have correct and consistent time?

Options:
A.

Each internal system is configured to be its own time server.

B.

Access to time configuration settings is available to all users of the system.

C.

Central time servers receive time signals from specific, approved external sources

D.

Each internal system peers directory with an external source to ensure accuracy of time updates

Questions 8

Which statement is true regarding the use of intrusion detection techniques, such as intrusion detection systems and/or intrusion protection systems (IDS'IPS)?

Options:
A.

Intrusion detection techniques are required on all system components

B.

Intrusion detection techniques are required to alert personnel of suspected compromises

C.

Intrusion detection techniques are required to isolate systems in the cardholder data environment from all other systems

D.

Intrusion detection techniques are required to identify all instances of cardholder data

Questions 9

What is the intent of classifying media that contains cardholder data?

Options:
A.

Ensuring that media is property protected according to the sensitivity of the data it contains

B.

Ensuring that media containing cardholder data is moved from secured areas an a quarterly basis

C.

Ensuring that media is clearly and visibly labeled as 'Confidential so all personnel know that the media contains cardholder data

D.

Ensuring that all media is consistently destroyed on the same schedule regardless of the contents

Questions 10

Passwords for default accounts and default administrative accounts should be?

Options:
A.

Changed within 30 days after installing a system on the network.

B.

Reset to the default password before installing a system on the network

C.

Changed before installing a system on the network

D.

Configured to expire in 30 days