Pass the PCI SSC PCI Qualified Professionals Assessor_New_V4 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following types of events is required to be logged?

Options:

A.

All use of end-user messaging technologies


B.

All access to external web sites


C.

All access to all audit trails


D.

All network transmissions


Expert Solution
Questions # 2:

If segmentation is being used to reduce the scope of a PCI DSS assessment the assessor will?

Options:

A.

Verify the segmentation controls allow only necessary traffic into the cardholder data environment.


B.

Verify the payment card brands have approved the segmentation


C.

Verify that approved devices and applications are used for the segmentation controls


D.

Verify the controls used for segmentation are configured properly and functioning as intended


Expert Solution
Questions # 3:

Which statement about PAN is true?

Options:

A.

It must be protected with strong cryptography for transmission over private wireless networks


B.

It must be protected with strong cryptography (or transmission over private wired networks


C.

It does not require protection for transmission over public wireless networks


D.

It does not require protection for transmission over public wired networks


Expert Solution
Questions # 4:

Which of the following is true regarding compensating controls?

Options:

A.

A compensating control is not necessary if all other PCI DSS requirements are in place


B.

A compensating control must address the risk associated with not adhering to the PCI DSS requirement


C.

An existing PCI DSS requirement can be used as compensating control if it is already implemented


D.

A compensating control worksheet is not required if the acquirer approves the compensating control


Expert Solution
Questions # 5:

In accordance with PCI DSS Requirement 10. how long must audit logs be retained?

Options:

A.

At least 1 year, with the most recent 3 months immediately available


B.

At least 2 years, with the most recent 3 months immediately available


C.

At least 2 years with the most recent month immediately available


D.

At least 3 months with the most recent month immediately available


Expert Solution
Questions # 6:

PCI DSS Requirement 12.7 requires screening and background checks for which of the following?

Options:

A.

All personnel employed by the organization


B.

Personnel with access to the cardholder data environment.


C.

Visitors with access to the organization s facilities


D.

Cashiers with access to one card number at a time


Expert Solution
Questions # 7:

Which of the following is a requirement for multi-tenant service providers?

Options:

A.

Ensure that customers cannot access another entity s cardholder data environment


B.

Provide customers with access to the hosting provider s system configuration files.


C.

Provide customers with a shared user ID for access to critical system binaries


D.

Ensure that a customer's log files are available to all hosted entities


Expert Solution
Questions # 8:

Viewing of audit log files should be limited to?

Options:

A.

Individuals who performed the logged activity


B.

Individuals with read/write access


C.

Individuals with administrator privileges


D.

Individuals with a job-related need


Expert Solution
Questions # 9:

What is the intent of classifying media that contains cardholder data?

Options:

A.

Ensuring that media is property protected according to the sensitivity of the data it contains


B.

Ensuring that media containing cardholder data is moved from secured areas an a quarterly basis


C.

Ensuring that media is clearly and visibly labeled as 'Confidential so all personnel know that the media contains cardholder data


D.

Ensuring that all media is consistently destroyed on the same schedule regardless of the contents


Expert Solution
Questions # 10:

Which of the following file types must be monitored by a change-detection mechanism (for example, a file-integrity monitoring tool)?

Options:

A.

Application vendor manuals


B.

Files that regularly change


C.

Security policy and procedure documents


D.

System configuration and parameter files


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions