Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the PCI SSC PCI Qualified Professionals Assessor_New_V4 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam Assessor_New_V4 Premium Access

View all detail and faqs for the Assessor_New_V4 exam


440 Students Passed

90% Average Score

93% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which scenario meets PCI DSS requirements for restricting access to databases containing cardholder data?

Options:

A.

User access to the database is only through programmatic methods

B.

User access to the database is restricted to system and network administrators

C.

Application IDs for database applications can only be used by database administrators

D.

Direct queries to the database are restricted to shared database administrator accounts

Questions # 2:

Viewing of audit log files should be limited to?

Options:

A.

Individuals who performed the logged activity

B.

Individuals with read/write access

C.

Individuals with administrator privileges

D.

Individuals with a job-related need

Questions # 3:

What process is requited by PCI DSS for protecting card-reading devices at the point-of-sale?

Options:

A.

Devices are periodically inspected to detect unauthorized card stammers.

B.

The serial number of each device is periodically verified with the device manufacturer

C.

Device identifiers and security labels are periodically replaced

D.

Devices are physically destroyed if there is suspicion of compromise

Questions # 4:

Which statement is true regarding the presence of both hashed and truncated versions of the same PAN in an environment?

Options:

A.

Controls are needed to prevent the original PAN being exposed by the hashed and truncated versions

B.

The hashed version of the PAN must also be truncated per PCI OSS requirements for strong cryptography.

C.

The hashed and truncated versions must be correlated so the source PAN can be identified

D.

Hashed and truncated versions of a PAN must not exist in same environment

Questions # 5:

Passwords for default accounts and default administrative accounts should be?

Options:

A.

Changed within 30 days after installing a system on the network.

B.

Reset to the default password before installing a system on the network

C.

Changed before installing a system on the network

D.

Configured to expire in 30 days

Questions # 6:

Which of the following file types must be monitored by a change-detection mechanism (for example, a file-integrity monitoring tool)?

Options:

A.

Application vendor manuals

B.

Files that regularly change

C.

Security policy and procedure documents

D.

System configuration and parameter files

Questions # 7:

Which of the following meets the definition of 'quarterly' as indicated in the description of timeframes used in PCI DSS requirements?

Options:

A.

Occurring at some point in each quarter of a year

B.

At least once every 95 97 days.

C.

On the 15th of each third month

D.

On the 1st of each fourth month

Questions # 8:

Which of the following describes the intent of installing one primary function per server?

Options:

A.

To allow functions with different security levels to be implemented on the same server

B.

To prevent server functions with a lower security level from introducing security weaknesses to higher -security functions on the same server

C.

To allow higher-security functions to protect lower-security functions installed on the same server

D.

To reduce the security level of functions with higher-security needs to meet the needs of lower-security functions

Questions # 9:

The intent of assigning a risk ranking to vulnerabilities is to?

Options:

A.

Ensure all vulnerabilities are addressed within 30 days

B.

Replace the need to quarterly ASV scans

C.

Prioritize the highest risk items so they can be addressed more quickly

D.

Ensure that critical security patches are installed at least quarterly

Questions # 10:

A network firewall has been configured with the latest vendor security patches What additional configuration is needed to harden the firewall?

Options:

A.

Remove the default 'Firewall Administrator account and create a shared account for firewall administrators to use.

B.

Configure the firewall to permit all traffic until additional rules are defined

C.

Synchronize the firewall rules with the other firewalls m the environment

D.

Disable any firewall functions that are not needed in production

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.