Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

PCI SSC QSA_New_V4 - Qualified Security Assessor V4 Exam

Page: 1 / 3
Total 75 questions

Which of the following meets the definition of "quarterly" as Indicated In the description of timeframes used In PCI DSS requirements?

A.

Occurring at some point in each quarter of a year.

B.

At least once every 95-97 days

C.

On the 15th of each third month.

D.

On the 1st of each fourth month.

Which of the following statements is true regarding track equivalent data on the chip of a payment card?

A.

It is allowed to be stored by merchants after authorization, if encrypted.

B.

It is sensitive authentication data.

C.

It is out of scope for PCI DSS.

D.

It is not applicable for PCI DSS Requirement 3.2.

Which of the following is a requirement for multi-tenant service providers?

A.

Ensure that customers cannot access another entity’s cardholder data environment.

B.

Provide customers with access to the hosting provider's system configuration files.

C.

Provide customers with a shared user ID for access to critical system binaries.

D.

Ensure that a customer’s log files are available to all hosted entities.

Which systems must have anti-malware solutions?

A.

All CDE systems, connected systems. NSCs, and security-providing systems.

B.

All portable electronic storage.

C.

All systems that store PAN.

D.

Any in-scope system except for those identified as 'not at risk' from malware.

Which of the following describes "stateful responses" to communication Initiated by a trusted network?

A.

Administrative access to respond to requests to change the firewall Is limited to one individual at a time.

B.

Active network connections are tracked so that invalid "response" traffic can be identified.

C.

A current baseline of application configurations is maintained and any mis-configuration is responded to promptly.

D.

Logs of user activity on the firewall are correlated to identify and respond to suspicious behavior.

What do PCI DSS requirements for protecting cryptographic keys include?

A.

Public keys must be encrypted with a key-encrypting key.

B.

Data-encrypting keys must be stronger than the key-encrypting key that protects it.

C.

Private or secret keys must be encrypted, stored within an SCD, or stored as key components.

D.

Key-encrypting keys and data-encrypting keys must be assigned to the same key custodian.

Which statement about the Attestation of Compliance (AOC) is correct?

A.

There are different AOC templates for service providers and merchants.

B.

The AOC must be signed by both the merchant/service provider and by PCI SSC.

C.

The same AOC template is used for ROCs and SAQs.

D.

The AOC must be signed by either the merchant/service provider or the QSA/ISA.

An entity is using custom software in their CDE. The custom software was developed using processes that were assessed by a Secure Software Lifecycle assessor and found to be fully compliant with the Secure SLC standard. What impact will this have on the entity’s PCI DSS assessment?

A.

It automatically makes an entity PCI DSS compliant.

B.

It may help the entity to meet several requirements in Requirement 6.

C.

There is no impact to the entity.

D.

The custom software can be excluded from the PCI DSS assessment.

What would be an appropriate strength for the key-encrypting key (KEK) used to protect an AES 128-bit data-encrypting key (DEK)?

A.

DES 256

B.

RSA 512

C.

AES 128

D.

ROT 13

Where can live PANs be used for testing?

A.

Production (live) environments only.

B.

Pre-production (test) environments only it located outside the CDE.

C.

Pre-production environments that are located within the CDE.

D.

Testing with live PANs must only be performed in the OSA Company environment.