Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

QSA_New_V4 Sample Questions Answers

Questions 4

An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA, while also ensuring that the customized control is implemented securely. Which of the following statements is true?

Options:

A.

You can assess the customized control, but another assessor must verify that you completed the TRA correctly.

B.

You can assess the customized control and verify that the customized approach was correctly followed, but you must document this in the ROC.

C.

You must document the work on the customized control in the ROC, but you can not assess the control or the documentation.

D.

Assessors are not allowed to assist an entity with the completion of the Controls Matrix or the TRA.

Buy Now
Questions 5

An internal NTP server that provides time services to the Cardholder Data Environment is?

Options:

A.

Only in scope if it provides time services to database servers.

B.

Not in scope for PCI DSS.

C.

Only in scope if it stores, processes or transmits cardholder data.

D.

In scope for PCI DSS.

Buy Now
Questions 6

Which of the following is true regarding internal vulnerability scans?

Options:

A.

They must be performed after a significant change.

B.

They must be performed by an Approved Scanning Vendor (ASV).

C.

They must be performed by QSA personnel.

D.

They must be performed at least annually.

Buy Now
Questions 7

Which statement is true regarding the PCI DSS Report on Compliance (ROC)?

Options:

A.

The ROC Reporting Template and instructions provided by PCI SSC should be used for all ROCs.

B.

The assessor may use either their own template or the ROC Reporting Template provided by PCI SSC.

C.

The assessor must create their own ROC template for each assessment report.

D.

The ROC Reporting Template provided by PCI SSC is only required for service provider assessments.

Buy Now
Questions 8

An entity is using custom software in their CDE. The custom software was developed using processes that were assessed by a Secure Software Lifecycle assessor and found to be fully compliant with the Secure SLC standard. What impact will this have on the entity’s PCI DSS assessment?

Options:

A.

It automatically makes an entity PCI DSS compliant.

B.

It may help the entity to meet several requirements in Requirement 6.

C.

There is no impact to the entity.

D.

The custom software can be excluded from the PCI DSS assessment.

Buy Now
Questions 9

In the ROC Reporting Template, which of the following is the best approach for a response where the requirement was “In Place”?

Options:

A.

Details of the entity’s project plan for implementing the requirement.

B.

Details of how the assessor observed the entity's systems were compliant with the requirement.

C.

Details of the entity's reason for not implementing the requirement.

D.

Details of how the assessor observed the entity's systems were not compliant with the requirement.

Buy Now
Questions 10

Which of the following describes “stateful responses” to communication initiated by a trusted network?

Options:

A.

Administrative access to respond to requests to change the firewall is limited to one individual at a time.

B.

Active network connections are tracked so that invalid “response” traffic can be identified.

C.

A current baseline of application configurations is maintained and any misconfiguration is responded to promptly.

D.

Logs of user activity on the firewall are correlated to identify and respond to suspicious behavior.

Buy Now
Questions 11

An organization wishes to implement multi-factor authentication for remote access, using the user's individual password and a digital certificate. Which of the following scenarios would meet PCI DSS requirements for multi-factor authentication?

Options:

A.

Certificates are assigned only to administrative groups, and not to regular users.

B.

A different certificate is assigned to each individual user account, and certificates are not shared.

C.

Certificates are logged so they can be retrieved when the employee leaves the company.

D.

Change control processes are in place to ensure certificates are changed every 90 days.

Buy Now
Questions 12

Which statement about PAN is true?

Options:

A.

It must be protected with strong cryptography for transmission over private wireless networks.

B.

It must be protected with strong cryptography tor transmission over private wired networks.

C.

It does not require protection for transmission over public wireless networks.

D.

It does not require protection for transmission over public wired networks.

Buy Now
Questions 13

In accordance with PCI DSS Requirement 10, how long must audit logs be retained?

Options:

A.

At least 1 year, with the most recent 3 months immediately available.

B.

At least 2 years, with the most recent 3 months immediately available.

C.

At least 2 years, with the most recent month immediately available.

D.

At least 3 months, with the most recent month immediately available.

Buy Now
Questions 14

An organization has implemented a change-detection mechanism on their systems. How often must critical file comparisons be performed?

Options:

A.

At least weekly

B.

Periodically as defined by the entity

C.

Only after a valid change is installed

D.

At least monthly

Buy Now
Questions 15

Which of the following statements is true whenever a cryptographic key is retired and replaced with a new key?

Options:

A.

The retired key must not be used for encryption operations.

B.

Cryptographic key components from the retired key must be retained for 3 months before disposal.

C.

A new key custodian must be assigned.

D.

All data encrypted under the retired key must be securely destroyed.

Buy Now
Questions 16

If disk encryption is used to protect account data, what requirement should be met for the disk encryption solution?

Options:

A.

Access to the disk encryption must be managed independently of the operating system access control mechanisms.

B.

The disk encryption system must use the same user account authenticator as the operating system.

C.

The decryption keys must be associated with the local user account database.

D.

The decryption keys must be stored within the local user account database.

Buy Now
Questions 17

PCI DSS Requirement 12.7 requires screening and background checks for which of the following?

Options:

A.

All personnel employed by the organization.

B.

Personnel with access to the cardholder data environment.

C.

Visitors with access to the organization’s facilities.

D.

Cashiers with access to one card number at a time.

Buy Now
Questions 18

An entity accepts e-commerce payment card transactions and stores account data in a database. The database server and the web server are both accessible from the Internet. The database server and the web server are on separate physical servers. What is required for the entity to meet PCI DSS requirements?

Options:

A.

The web server and the database server should be installed on the same physical server.

B.

The database server should be relocated so that it is not accessible from untrusted networks.

C.

The web server should be moved into the internal network.

D.

The database server should be moved to a separate segment from the web server to allow for more concurrent connections.

Buy Now
Questions 19

Which statement about the Attestation of Compliance (AOC) is correct?

Options:

A.

There are different AOC templates for service providers and merchants.

B.

The AOC must be signed by both the merchant/service provider and by PCI SSC.

C.

The same AOC template is used for ROCs and SAQs.

D.

The AOC must be signed by either the merchant/service provider or the QSA/ISA.

Buy Now
Questions 20

Which of the following describes the intent of installing one primary function per server?

Options:

A.

To allow functions with different security levels to be implemented on the same server.

B.

To prevent server functions with a lower security level from introducing security weaknesses to higher-security functions on the same server.

C.

To allow higher-security functions to protect lower-security functions installed on the same server.

D.

To reduce the security level of functions with higher-security needs to meet the needs of lower-security functions.

Buy Now
Questions 21

Which of the following is an example of multi-factor authentication?

Options:

A.

A token that must be presented twice during the login process.

B.

A user passphrase and an application-level password.

C.

A user password and a PIN-activated smart card.

D.

A user fingerprint and a user thumbprint.

Buy Now
Questions 22

Which scenario meets PCI DSS requirements for restricting access to databases containing cardholder data?

Options:

A.

User access to the database is only through programmatic methods.

B.

User access to the database is restricted to system and network administrators.

C.

Application IDs for database applications can only be used by database administrators.

D.

Direct queries to the database are restricted to shared database administrator accounts.

Buy Now
Exam Code: QSA_New_V4
Exam Name: Qualified Security Assessor V4 Exam
Last Update: Jul 27, 2025
Questions: 75
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now QSA_New_V4