Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the PCI SSC Assessor_New_V4 Exam Assessor_New_V4 Questions and answers with ValidTests

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following file types must be monitored by a change-detection mechanism (for example, a file-integrity monitoring tool)?

Options:

A.

Application vendor manuals

B.

Files that regularly change

C.

Security policy and procedure documents

D.

System configuration and parameter files

Expert Solution
Questions # 2:

In accordance with PCI DSS Requirement 10. how long must audit logs be retained?

Options:

A.

At least 1 year, with the most recent 3 months immediately available

B.

At least 2 years, with the most recent 3 months immediately available

C.

At least 2 years with the most recent month immediately available

D.

At least 3 months with the most recent month immediately available

Expert Solution
Questions # 3:

An entity wants to know if the Software Security Framework can be leveraged during their assessment Which of the following software types would this apply to?

Options:

A.

Any payment software in the CDE

B.

Only software which runs on PCI PTS devices

C.

Validated Payment Applications that are listed by PCI SSC and have undergone a PA-DSS assessment

D.

Software developed by the entity in accordance with the Secure SLC Standard

Expert Solution
Questions # 4:

At which step in the payment transaction process does the merchants bank pay the merchant for the purchase and the cardholder s bank bill the cardholder?

Options:

A.

Authorization

B.

Clearing

C.

Settlement

D.

Chargeback

Expert Solution
Questions # 5:

An entity is using custom software in their CDE. The custom software was developed using processes that were assessed by a Secure Software Lifecycle assessor and found to be fully compliant with the Secure SLC standard. What impact will this have on the entity's PCI DSS assessment?

Options:

A.

It automatically makes an entity PCI DSS compliant

B.

It may help the entity to meet several requirements in Requirement 6.

C.

There is no impact to the entity

D.

The custom software can be excluded from the PCI DSS assessment

Expert Solution
Questions # 6:

Security policies and operational procedures should be?

Options:

A.

Encrypted with strong cryptography

B.

Stored securely so that only management has access

C.

Reviewed and updated at least quarterly

D.

Distributed to and understood by all affected parties

Expert Solution
Questions # 7:

Which of the following is a requirement for multi-tenant service providers?

Options:

A.

Ensure that customers cannot access another entity s cardholder data environment

B.

Provide customers with access to the hosting provider s system configuration files.

C.

Provide customers with a shared user ID for access to critical system binaries

D.

Ensure that a customer's log files are available to all hosted entities

Expert Solution
Questions # 8:

A network firewall has been configured with the latest vendor security patches What additional configuration is needed to harden the firewall?

Options:

A.

Remove the default 'Firewall Administrator account and create a shared account for firewall administrators to use.

B.

Configure the firewall to permit all traffic until additional rules are defined

C.

Synchronize the firewall rules with the other firewalls m the environment

D.

Disable any firewall functions that are not needed in production

Expert Solution
Questions # 9:

Which of the following statements is true regarding track equivalent data on the chip of a payment card?

Options:

A.

It is allowed to be stored by merchants after authorization if encrypted

B.

It is sensitive authentication data

C.

It is out of scope for PCI DSS

D.

It is not applicable for PCI DSS Requirement 3.2

Expert Solution
Questions # 10:

PCI DSS Requirement 12.7 requires screening and background checks for which of the following?

Options:

A.

All personnel employed by the organization

B.

Personnel with access to the cardholder data environment.

C.

Visitors with access to the organization s facilities

D.

Cashiers with access to one card number at a time

Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions