Pass the PCI SSC PCI Qualified Professionals QSA_New_V4 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which systems must have anti-malware solutions?

Options:

A.

All CDE systems, connected systems. NSCs, and security-providing systems.


B.

All portable electronic storage.


C.

All systems that store PAN.


D.

Any in-scope system except for those identified as 'not at risk' from malware.


Expert Solution
Questions # 2:

What does the PCI PTS standard cover?

Options:

A.

Point-of-interaction devices used to protect account data.


B.

Secure coding practices for commercial payment applications.


C.

Development of strong cryptographic algorithms.


D.

End-to-end encryption solutions for transmission of account data.


Expert Solution
Questions # 3:

The intent of assigning a risk ranking to vulnerabilities is to?

Options:

A.

Ensure all vulnerabilities are addressed within 30 days.


B.

Replace the need for quarterly ASV scans.


C.

Prioritize the highest risk items so they can be addressed more quickly.


D.

Ensure that critical security patches are installed at least quarterly.


Expert Solution
Questions # 4:

Which statement is true regarding the presence of both hashed and truncated versions of the same PAN in an environment?

Options:

A.

Controls are needed to prevent the original PAN being exposed by the hashed and truncated versions.


B.

The hashed version of the PAN must also be truncated per PCI DSS requirements for strong cryptography.


C.

The hashed and truncated versions must be correlated so the source PAN can be identified.


D.

Hashed and truncated versions of a PAN must not exist in same environment.


Expert Solution
Questions # 5:

Which statement about the Attestation of Compliance (AOC) is correct?

Options:

A.

There are different AOC templates for service providers and merchants.


B.

The AOC must be signed by both the merchant/service provider and by PCI SSC.


C.

The same AOC template is used for ROCs and SAQs.


D.

The AOC must be signed by either the merchant/service provider or the QSA/ISA.


Expert Solution
Questions # 6:

Where an entity under assessment is using the customized approach, which of the following steps is the responsibility of the assessor?

Options:

A.

Monitor the control.


B.

Derive testing procedures and document them in Appendix E of the ROC.


C.

Document and maintain evidence about each customized control as defined in Appendix E of PCI DSS.


D.

Perform the targeted risk analysis as per PCI DSS requirement 12.3.2.


Expert Solution
Questions # 7:

What process is required by PCI DSS for protecting card-reading devices at the point-of-sale?

Options:

A.

Devices are periodically inspected to detect unauthorized card skimmers.


B.

The serial number of each device is periodically verified with the device manufacturer.


C.

Device identifiers and security labels are periodically replaced.


D.

Devices are physically destroyed if there is suspicion of compromise.


Expert Solution
Questions # 8:

Which of the following is a requirement for multi-tenant service providers?

Options:

A.

Ensure that customers cannot access another entity’s cardholder data environment.


B.

Provide customers with access to the hosting provider's system configuration files.


C.

Provide customers with a shared user ID for access to critical system binaries.


D.

Ensure that a customer’s log files are available to all hosted entities.


Expert Solution
Questions # 9:

Which statement is true regarding the PCI DSS Report on Compliance (ROC)?

Options:

A.

The ROC Reporting Template and instructions provided by PCI SSC should be used for all ROCs.


B.

The assessor may use either their own template or the ROC Reporting Template provided by PCI SSC.


C.

The assessor must create their own ROC template for each assessment report.


D.

The ROC Reporting Template provided by PCI SSC is only required for service provider assessments.


Expert Solution
Questions # 10:

Which of the following describes "stateful responses" to communication Initiated by a trusted network?

Options:

A.

Administrative access to respond to requests to change the firewall Is limited to one individual at a time.


B.

Active network connections are tracked so that invalid "response" traffic can be identified.


C.

A current baseline of application configurations is maintained and any mis-configuration is responded to promptly.


D.

Logs of user activity on the firewall are correlated to identify and respond to suspicious behavior.


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions