Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free PCI SSC QSA_New_V4 Practice Exam with Questions & Answers | Set: 2

Questions 11

Which of the following parties is responsible for completion of the Controls Matrix for the Customized Approach?

Options:
A.

Only a Qualified Security Assessor (QSA).

B.

Either a QSA, AQSA, or PCIP.

C.

Entity being assessed.

D.

Card brands or acquirer.

PCI SSC QSA_New_V4 Premium Access
Questions 12

Which of the following is true regarding compensating controls?

Options:
A.

A compensating control is not necessary if all other PCI DSS requirements are in place.

B.

A compensating control must address the risk associated with not adhering to the PCI DSS requirement.

C.

An existing PCI DSS requirement can be used as compensating control if it is already implemented.

D.

A compensating control worksheet is not required if the acquirer approves the compensating control.

Questions 13

Which of the following file types must be monitored by a change-detection mechanism (e.g., a file-integrity monitoring tool)?

Options:
A.

Application vendor manuals

B.

Files that regularly change

C.

Security policy and procedure documents

D.

System configuration and parameter files

Questions 14

According to Requirement 1, what is the purpose of “Network Security Controls"?

Options:
A.

Manage anti-malware throughout the CDE.

B.

Control network traffic between two or more logical or physical network segments.

C.

Discover vulnerabilities and rank them.

D.

Encrypt PAN when stored.

Questions 15

If an entity shares cardholder data with a TPSP, what activity is the entity required to perform?

Options:
A.

The entity must conduct ASV scans on the TPSP’s systems at least annually.

B.

The entity must perform a risk assessment of the TPSP's environment at least quarterly.

C.

The entity must test the TPSP's incident response plan at least quarterly.

D.

The entity must monitor the TPSP’s PCI DSS compliance status at least annually.

Questions 16

What process is required by PCI DSS for protecting card-reading devices at the point-of-sale?

Options:
A.

Devices are periodically inspected to detect unauthorized card skimmers.

B.

The serial number of each device is periodically verified with the device manufacturer.

C.

Device identifiers and security labels are periodically replaced.

D.

Devices are physically destroyed if there is suspicion of compromise.

Questions 17

Which of the following is required to be included in an incident response plan?

Options:
A.

Procedures for notifying PCI SSC of the security incident.

B.

Procedures for responding to the detection of unauthorized wireless access points.

C.

Procedures for securely deleting incident response records immediately upon resolution of the incident.

D.

Procedures for launching a reverse-attack on the individual(s) responsible for the security incident.

Questions 18

Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?

Options:
A.

Routers that monitor network traffic flows between the CDE and out-of-scope networks.

B.

Firewalls that log all network traffic flows between the CDE and out-of-scope networks.

C.

Virtual LANs that route network traffic between the CDE and out-of-scope networks.

D.

A network configuration that prevents all network traffic between the CDE and out-of-scope networks.

Questions 19

An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA, while also ensuring that the customized control is implemented securely. Which of the following statements is true?

Options:
A.

You can assess the customized control, but another assessor must verify that you completed the TRA correctly.

B.

You can assess the customized control and verify that the customized approach was correctly followed, but you must document this in the ROC.

C.

You must document the work on the customized control in the ROC, but you can not assess the control or the documentation.

D.

Assessors are not allowed to assist an entity with the completion of the Controls Matrix or the TRA.

Questions 20

An organization wishes to implement multi-factor authentication for remote access, using the user's individual password and a digital certificate. Which of the following scenarios would meet PCI DSS requirements for multi-factor authentication?

Options:
A.

Certificates are assigned only to administrative groups, and not to regular users.

B.

A different certificate is assigned to each individual user account, and certificates are not shared.

C.

Certificates are logged so they can be retrieved when the employee leaves the company.

D.

Change control processes are in place to ensure certificates are changed every 90 days.