New Year Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > PCI SSC > PCI Qualified Professionals > QSA_New_V4

QSA_New_V4 Qualified Security Assessor V4 Exam Question and Answers

Question # 4

If segmentation is being used to reduce the scope of a PCI DSS assessment, the assessor will?

A.

Verify the segmentation controls allow only necessary traffic Into the cardholder data environment.

B.

Verify the payment card brands have approved the segmentation.

C.

Verify that approved devices and applications are used for the segmentation controls.

D.

Verify the controls used for segmentation are configured properly and functioning as intended

Full Access
Question # 5

Which scenario meets PCI DSS requirements for restricting access to databases containing cardholder data?

A.

User access to the database Is only through programmatic methods.

B.

User access to the database Is restricted to system and network administrators.

C.

Application IDs for database applications can only be used by database administrators.

D.

Direct queries to the database are restricted to shared database administrator accounts.

Full Access
Question # 6

Which systems must have anti-malware solutions?

A.

All CDE systems, connected systems.NSCs, and security-providing systems.

B.

All portable electronic storage.

C.

All systems that store PAN.

D.

Any in-scope system except for those identified as 'not at risk' from malware.

Full Access
Question # 7

At which step in the payment transaction process does the merchant's bank pay the merchant for the purchase, and the cardholder's bank bill the cardholder?

A.

Authorization

B.

Clearing

C.

Settlement

D.

Chargeback

Full Access
Question # 8

An organization wishes to implement multi-factor authentication for remote access, using the user's Individual password and a digital certificate. Which of the following scenarios would meet PCI DSS requirements for multi-factor authentication?

A.

Certificates are assigned only to administrative groups, and not to regular users.

B.

A different certificate is assigned to each individual user account, and certificates are not shared.

C.

Certificates are logged so they can be retrieved when the employee leaves the company.

D.

Change control processes are In place to ensure certificates are changed every 90 days.

Full Access
Question # 9

Viewing of audit log files should be limited to?

A.

Individuals who performed the logged activity.

B.

Individuals with read/write access.

C.

Individuals with administrator privileges.

D.

Individuals with a job-related need.

Full Access
Question # 10

A network firewall has been configured with the latest vendor security patches. What additional configuration Is needed to harden the firewall?

A.

Remove the default "Firewall Administrator account and create a shared account for firewall administrators to use.

B.

Configure the firewall to permit all traffic until additional rules are defined.

C.

Synchronize the firewall rules with the other firewalls in the environment.

D.

Disable any firewall functions that are not needed in production.

Full Access
Question # 11

Which of the following is true regarding internal vulnerability scans?

A.

They must be performed after a significant change.

B.

They must be performed by an Approved Scanning Vendor (ASV).

C.

They must be performed by QSA personnel.

D.

They must be performed at least annually.

Full Access
Question # 12

Which statement about the Attestation of Compliance (AOC) is correct?

A.

There are different AOC templates for service providers and merchants.

B.

The AOC must be signed by both the merchant/service provider and by PCI SSC.

C.

The same AOC template is used W ROCs and SAQs.

D.

The AOC must be signed by either the merchant/service provider or the QSA/ISA.

Full Access