Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free PCI SSC Assessor_New_V4 Practice Exam with Questions & Answers | Set: 2

Questions 11

Which of the following is an example of multi-factor authentication?

Options:
A.

A token that must be presented twice during the login process

B.

A user passphrase and an application level password.

C.

A user password and a PIN-activated smart card

D.

A user fingerprint and a user thumbprint

PCI SSC Assessor_New_V4 Premium Access
Questions 12

Where can live PANs be used for testing?

Options:
A.

Production (live) environments only

B.

Pre-production (test) environments only if located outside the CDE.

C.

Pre-production environments that are located within the CDE

D.

Testing with live PANs must only be performed in the QSA Company environment

Questions 13

Could an entity use both the Customized Approach and the Defined Approach to meet the same requirement?

Options:
A.

No because a single approach must be selected

B.

No. because only compensating controls can be used with the Defined Approach

C.

Yes if the entity uses no compensating controls

D.

Yes if the entity is eligible to use both approaches

Questions 14

Which systems must have anti-malware solutions'

Options:
A.

All CDE systems, connected systems. NSCs. and security-providing systems

B.

All portable electronic storage

C.

All systems that store PAN

D.

Any in-scope system except for those identified as not at risk from malware

Questions 15

What do PCI DSS requirements for protecting cryptographic keys include?

Options:
A.

Public keys must be encrypted with a key-encrypting key.

B.

Data-encrypting keys must be stronger than the key-encrypting key that protects it.

C.

Private or secret keys must be encrypted, stored within an SCD or stored as key components

D.

Key-encrypting keys and data-encrypting keys must be assigned to the same key custodian

Questions 16

An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA. while also ensuing that the customized control is implemented securely. Which of the following statements is true?

Options:
A.

You can assess the customized control but another assessor must verify that you completed the TRA correctly.

B.

You can assess the customized control and verify that the customized approach was correctly followed but you must document this in the ROC.

C.

You must document the work on the customized control in the ROC but you can not assess the control or the documentation.

D.

Assessors are not allowed to assist an entity with the completion of the Controls Matrix or the TRA.

Questions 17

The intent of assigning a risk ranking to vulnerabilities is to?

Options:
A.

Ensure all vulnerabilities are addressed within 30 days

B.

Replace the need to quarterly ASV scans

C.

Prioritize the highest risk items so they can be addressed more quickly

D.

Ensure that critical security patches are installed at least quarterly

Questions 18

A sample of business facilities is reviewed during the PCI DSS assessment What is the assessor required to validate about the sample?

Options:
A.

It includes a consistent set of facilities that are reviewed for all assessments.

B.

The number of facilities in the sample is at least 10 percent of the total number of facilities

C.

Every facility where cardholder data is stored is reviewed

D.

All types and locations of facilities are represented