Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

Assessor_New_V4 Assessor_New_V4 Exam Questions and Answers

Questions 4

Which scenario meets PCI DSS requirements for restricting access to databases containing cardholder data?

Options:

A.

User access to the database is only through programmatic methods

B.

User access to the database is restricted to system and network administrators

C.

Application IDs for database applications can only be used by database administrators

D.

Direct queries to the database are restricted to shared database administrator accounts

Buy Now
Questions 5

An organization has implemented a change-detection mechanism on their systems. How often must critical file comparisons be performed?

Options:

A.

At least weekly

B.

Periodically as defined by the entity

C.

Only after a valid change is installed

D.

At least monthly

Buy Now
Questions 6

Which statement is true regarding the use of intrusion detection techniques, such as intrusion detection systems and/or intrusion protection systems (IDS'IPS)?

Options:

A.

Intrusion detection techniques are required on all system components

B.

Intrusion detection techniques are required to alert personnel of suspected compromises

C.

Intrusion detection techniques are required to isolate systems in the cardholder data environment from all other systems

D.

Intrusion detection techniques are required to identify all instances of cardholder data

Buy Now
Questions 7

What should the assessor verify when testing that cardholder data is protected whenever it is sent over open public networks?

Options:

A.

The security protocol is configured to accept all digital certificates

B.

A proprietary security protocol is used

C.

The security protocol accepts only trusted keys

D.

The security protocol accepts connections from systems with lower encryption strength than required by the protocol

Buy Now
Questions 8

Which of the following is true regarding compensating controls?

Options:

A.

A compensating control is not necessary if all other PCI DSS requirements are in place

B.

A compensating control must address the risk associated with not adhering to the PCI DSS requirement

C.

An existing PCI DSS requirement can be used as compensating control if it is already implemented

D.

A compensating control worksheet is not required if the acquirer approves the compensating control

Buy Now
Questions 9

Security policies and operational procedures should be?

Options:

A.

Encrypted with strong cryptography

B.

Stored securely so that only management has access

C.

Reviewed and updated at least quarterly

D.

Distributed to and understood by all affected parties

Buy Now
Questions 10

Which statement about the Attestation of Compliance (AOC) is correct?

Options:

A.

There are different AOC templates for service providers and merchants

B.

The AOC must be signed by both the merchant/service provider and by PCI SSC

C.

The same AOC template is used for ROCs and SAQs

D.

The AOC must be signed by either the merchant service provider or the QSA'ISA

Buy Now
Questions 11

Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?

Options:

A.

Routers that monitor network traffic flows between the CDE and out-of-scope networks

B.

Firewalls that log all network traffic flows between the CDE and out of-scope networks

C.

Virtual LANs that route network traffic between the CDE and out-of-scope networks

D.

A network configuration that prevents all network traffic between the CDE and out-of-scope networks

Buy Now
Questions 12

Which of the following file types must be monitored by a change-detection mechanism (for example, a file-integrity monitoring tool)?

Options:

A.

Application vendor manuals

B.

Files that regularly change

C.

Security policy and procedure documents

D.

System configuration and parameter files

Buy Now
Questions 13

Which of the following parties is responsible for completion of the Controls Matrix for the Customized Approach?

Options:

A.

Only a Qualified Security Assessor (QSA)

B.

Either a QSA, AQSA, or PClP.

C.

Entity being assessed

D.

Card brands or acquirer

Buy Now
Questions 14

An entity wants to know if the Software Security Framework can be leveraged during their assessment Which of the following software types would this apply to?

Options:

A.

Any payment software in the CDE

B.

Only software which runs on PCI PTS devices

C.

Validated Payment Applications that are listed by PCI SSC and have undergone a PA-DSS assessment

D.

Software developed by the entity in accordance with the Secure SLC Standard

Buy Now
Questions 15

Which of the following describes the intent of installing one primary function per server?

Options:

A.

To allow functions with different security levels to be implemented on the same server

B.

To prevent server functions with a lower security level from introducing security weaknesses to higher -security functions on the same server

C.

To allow higher-security functions to protect lower-security functions installed on the same server

D.

To reduce the security level of functions with higher-security needs to meet the needs of lower-security functions

Buy Now
Questions 16

Which statement is true regarding the presence of both hashed and truncated versions of the same PAN in an environment?

Options:

A.

Controls are needed to prevent the original PAN being exposed by the hashed and truncated versions

B.

The hashed version of the PAN must also be truncated per PCI OSS requirements for strong cryptography.

C.

The hashed and truncated versions must be correlated so the source PAN can be identified

D.

Hashed and truncated versions of a PAN must not exist in same environment

Buy Now
Questions 17

A sample of business facilities is reviewed during the PCI DSS assessment What is the assessor required to validate about the sample?

Options:

A.

It includes a consistent set of facilities that are reviewed for all assessments.

B.

The number of facilities in the sample is at least 10 percent of the total number of facilities

C.

Every facility where cardholder data is stored is reviewed

D.

All types and locations of facilities are represented

Buy Now
Questions 18

Which statement is true regarding the PCI DSS Report on Compliance (ROC)?

Options:

A.

The ROC Reporting Template and instructions provided by PCI SSC should be used for all ROCs.

B.

The assessor may use either their own template or the ROC Reporting Template provided by PCI SSC

C.

The assessor must create their own ROC template for each assessment report

D.

The ROC Reporting Template provided by PCI SSC is only required for service provider assessments

Buy Now
Exam Code: Assessor_New_V4
Exam Name: Assessor_New_V4 Exam
Last Update: Sep 19, 2024
Questions: 60

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now Assessor_New_V4 testing engine

PDF (Q&A)

$35  $99.99
buy now Assessor_New_V4 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 21 Sep 2024