Pass the PCI SSC PCI Qualified Professionals Assessor_New_V4 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

What does the PCI PTS standard cover?

Options:

A.

Point-of-interaction devices used to protect account data


B.

Secure coding practices for commercial payment applications.


C.

Development of strong cryptographic algorithms


D.

End-to-end encryption solutions for transmission of account data


Expert Solution
Questions # 12:

Which scenario meets PCI DSS requirements for critical systems to have correct and consistent time?

Options:

A.

Each internal system is configured to be its own time server.


B.

Access to time configuration settings is available to all users of the system.


C.

Central time servers receive time signals from specific, approved external sources


D.

Each internal system peers directory with an external source to ensure accuracy of time updates


Expert Solution
Questions # 13:

Which scenario meets PCI DSS requirements for restricting access to databases containing cardholder data?

Options:

A.

User access to the database is only through programmatic methods


B.

User access to the database is restricted to system and network administrators


C.

Application IDs for database applications can only be used by database administrators


D.

Direct queries to the database are restricted to shared database administrator accounts


Expert Solution
Questions # 14:

Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?

Options:

A.

Routers that monitor network traffic flows between the CDE and out-of-scope networks


B.

Firewalls that log all network traffic flows between the CDE and out of-scope networks


C.

Virtual LANs that route network traffic between the CDE and out-of-scope networks


D.

A network configuration that prevents all network traffic between the CDE and out-of-scope networks


Expert Solution
Questions # 15:

What process is requited by PCI DSS for protecting card-reading devices at the point-of-sale?

Options:

A.

Devices are periodically inspected to detect unauthorized card stammers.


B.

The serial number of each device is periodically verified with the device manufacturer


C.

Device identifiers and security labels are periodically replaced


D.

Devices are physically destroyed if there is suspicion of compromise


Expert Solution
Questions # 16:

An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA. while also ensuing that the customized control is implemented securely. Which of the following statements is true?

Options:

A.

You can assess the customized control but another assessor must verify that you completed the TRA correctly.


B.

You can assess the customized control and verify that the customized approach was correctly followed but you must document this in the ROC.


C.

You must document the work on the customized control in the ROC but you can not assess the control or the documentation.


D.

Assessors are not allowed to assist an entity with the completion of the Controls Matrix or the TRA.


Expert Solution
Questions # 17:

Could an entity use both the Customized Approach and the Defined Approach to meet the same requirement?

Options:

A.

No because a single approach must be selected


B.

No. because only compensating controls can be used with the Defined Approach


C.

Yes if the entity uses no compensating controls


D.

Yes if the entity is eligible to use both approaches


Expert Solution
Questions # 18:

An entity is using custom software in their CDE. The custom software was developed using processes that were assessed by a Secure Software Lifecycle assessor and found to be fully compliant with the Secure SLC standard. What impact will this have on the entity's PCI DSS assessment?

Options:

A.

It automatically makes an entity PCI DSS compliant


B.

It may help the entity to meet several requirements in Requirement 6.


C.

There is no impact to the entity


D.

The custom software can be excluded from the PCI DSS assessment


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions