Easter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

Assessor_New_V4 Sample Questions Answers

Questions 4

Which of the following is required to be included in an incident response plan?

Options:

A.

Procedures for notifying PCI SSC of the security incident

B.

Procedures for responding to the detection of unauthorized wireless access points

C.

Procedures for securely deleting incident response records immediately upon resolution of the incident

D.

Procedures for launching a reverse-attack on the individual(s) responsible for the security incident

Buy Now
Questions 5

Viewing of audit log files should be limited to?

Options:

A.

Individuals who performed the logged activity

B.

Individuals with read/write access

C.

Individuals with administrator privileges

D.

Individuals with a job-related need

Buy Now
Questions 6

If an entity shares cardholder data with a TPSP, what activity is the entity required to perform'?

Options:

A.

The entity must conduct ASV scans on the TPSP's systems at least annually

B.

The entity must perform a risk assessment of the TPSP's environment at least quarterly.

C.

The entity must test the TPSP's incident response plan at least quarterly

D.

The entity must monitor the TPSP's PCI DSS compliance status at least annually

Buy Now
Questions 7

An LDAP server providing authentication services to the cardholder data environment is

Options:

A.

in scope for PCI DSS.

B.

not in scope for PCI DSS

C.

in scope only if it stores processes or transmits cardholder data

D.

in scope only if it provides authentication services to systems in the DMZ

Buy Now
Questions 8

In the ROC Repotting Template, which of the following is the best approach for a response where the requirement was in Place’’?

Options:

A.

Details of the entity s project plan for implementing the requirement

B.

Details of how the assessor observed the entity s systems were compliant with the requirement

C.

Details of the entity s reason for not implementing the requirement

D.

Details of how the assessor observed the entity s systems were not compliant with the requirement

Buy Now
Questions 9

What would be an appropriate strength for the key-encrypting key (KEK) used to protect an AES 128-bit data-encrypting key (DEK)

Options:

A.

DES256

B.

RSA512

C.

AES 128

D.

ROT 13

Buy Now
Questions 10

What do PCI DSS requirements for protecting cryptographic keys include?

Options:

A.

Public keys must be encrypted with a key-encrypting key.

B.

Data-encrypting keys must be stronger than the key-encrypting key that protects it.

C.

Private or secret keys must be encrypted, stored within an SCD or stored as key components

D.

Key-encrypting keys and data-encrypting keys must be assigned to the same key custodian

Buy Now
Questions 11

Security policies and operational procedures should be?

Options:

A.

Encrypted with strong cryptography

B.

Stored securely so that only management has access

C.

Reviewed and updated at least quarterly

D.

Distributed to and understood by all affected parties

Buy Now
Questions 12

Assigning a unique ID to each person is intended to ensure?

Options:

A.

Strong passwords are used for each user account

B.

Shared accounts are only used by administrators

C.

Individual users are accountable for their own actions

D.

Access is assigned to group accounts based on need-to-know

Buy Now
Questions 13

Which of the following is an example of multi-factor authentication?

Options:

A.

A token that must be presented twice during the login process

B.

A user passphrase and an application level password.

C.

A user password and a PIN-activated smart card

D.

A user fingerprint and a user thumbprint

Buy Now
Questions 14

Which of the following is a requirement for multi-tenant service providers?

Options:

A.

Ensure that customers cannot access another entity s cardholder data environment

B.

Provide customers with access to the hosting provider s system configuration files.

C.

Provide customers with a shared user ID for access to critical system binaries

D.

Ensure that a customer's log files are available to all hosted entities

Buy Now
Questions 15

A sample of business facilities is reviewed during the PCI DSS assessment What is the assessor required to validate about the sample?

Options:

A.

It includes a consistent set of facilities that are reviewed for all assessments.

B.

The number of facilities in the sample is at least 10 percent of the total number of facilities

C.

Every facility where cardholder data is stored is reviewed

D.

All types and locations of facilities are represented

Buy Now
Questions 16

Which of the following is true regarding internal vulnerability scans?

Options:

A.

They must be performed after a significant change

B.

They must be performed by an Approved Scanning Vendor (ASV)

C.

They must be performed by QSA personnel

D.

They must be performed at least annually

Buy Now
Questions 17

Which systems must have anti-malware solutions'

Options:

A.

All CDE systems, connected systems. NSCs. and security-providing systems

B.

All portable electronic storage

C.

All systems that store PAN

D.

Any in-scope system except for those identified as not at risk from malware

Buy Now
Questions 18

PCI DSS Requirement 12.7 requires screening and background checks for which of the following?

Options:

A.

All personnel employed by the organization

B.

Personnel with access to the cardholder data environment.

C.

Visitors with access to the organization s facilities

D.

Cashiers with access to one card number at a time

Buy Now
Exam Code: Assessor_New_V4
Exam Name: Assessor_New_V4 Exam
Last Update: May 14, 2024
Questions: 60
$64  $159.99
$48  $119.99
$40  $99.99
buy now Assessor_New_V4