Pass the PCI SSC PCI Qualified Professionals ISA-N_Retake Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?

Options:

A.

Routers that monitor network traffic flows between the CDE and out-of-scope networks


B.

Firewalls that log all network traffic flows between the CDE and out of-scope networks


C.

Virtual LANs that route network traffic between the CDE and out-of-scope networks


D.

A network configuration that prevents all network traffic between the CDE and out-of-scope networks


Expert Solution
Questions # 2:

A "Partial Assessment is a new assessment result What is a ‘Partial Assessment’?

Options:

A.

A ROC that has been completed after using an SAQ to determine which requirements should be tested. As per FAQ 1331. (As long as the entity meets the SAQs eligibility criteria)


B.

An interim result before the final ROC has been completed


C.

A term used by payment brands and acquirers to describe entities that have multiple payment channels with each channel having its own assessment


D.

An assessment with at least one requirement marked as Not Tested”


Expert Solution
Questions # 3:

Which systems must have anti-malware solutions'

Options:

A.

All CDE systems, connected systems. NSCs. and security-providing systems


B.

All portable electronic storage


C.

All systems that store PAN


D.

Any in-scope system except for those identified as not at risk from malware


Expert Solution
Questions # 4:

An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA. while also ensuing that the customized control is implemented securely. Which of the following statements is true?

Options:

A.

You can assess the customized control but another assessor must verify that you completed the TRA correctly.


B.

You can assess the customized control and verify that the customized approach was correctly followed but you must document this in the ROC.


C.

You must document the work on the customized control in the ROC but you can not assess the control or the documentation.


D.

Assessors are not allowed to assist an entity with the completion of the Controls Matrix or the TRA.


Expert Solution
Questions # 5:

Which of the following describes "stateful responses' to communication initiated by a trusted network?

Options:

A.

Administrative access to respond to requests to change the firewall is limited to one individual at a time


B.

Active network connections are tracked so that invalid response' traffic can be identified.


C.

A current baseline of application configurations is maintained and any mis-configuration is responded to promptly


D.

Logs of user activity on the firewall are correlated to identify and respond to suspicious behavior


Expert Solution
Questions # 6:

The intent of assigning a risk ranking to vulnerabilities is to?

Options:

A.

Ensure all vulnerabilities are addressed within 30 days


B.

Replace the need to quarterly ASV scans


C.

Prioritize the highest risk items so they can be addressed more quickly


D.

Ensure that critical security patches are installed at least quarterly


Expert Solution
Questions # 7:

Which of the following is required to be included in an incident response plan?

Options:

A.

Procedures for notifying PCI SSC of the security incident


B.

Procedures for responding to the detection of unauthorized wireless access points


C.

Procedures for securely deleting incident response records immediately upon resolution of the incident


D.

Procedures for launching a reverse-attack on the individual(s) responsible for the security incident


Expert Solution
Questions # 8:

What would be an appropriate strength for the key-encrypting key (KEK) used to protect an AES 128-bit data-encrypting key (DEK)

Options:

A.

DES256


B.

RSA512


C.

AES 128


D.

ROT 13


Expert Solution
Questions # 9:

In the ROC Repotting Template, which of the following is the best approach for a response where the requirement was in Place’’?

Options:

A.

Details of the entity s project plan for implementing the requirement


B.

Details of how the assessor observed the entity s systems were compliant with the requirement


C.

Details of the entity s reason for not implementing the requirement


D.

Details of how the assessor observed the entity s systems were not compliant with the requirement


Expert Solution
Questions # 10:

An entity accepts e-commerce payment card transactions and stores account data in a database The database server and the web server are both accessible from the Internet The database server and the web server are on separate physical servers. What is required for the entity to meet PCI DSS requirements7

Options:

A.

The web server and the database server should be installed on the same physical server


B.

The database server should be relocated so that it is not accessible from untrusted networks


C.

The web server should be moved into the internal network


D.

The database server should be moved to a separate segment from the web server to allow for more concurrent connections


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions