Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the PCI SSC PCI Qualified Professionals QSA_New_V4 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam QSA_New_V4 Premium Access

View all detail and faqs for the QSA_New_V4 exam


432 Students Passed

89% Average Score

98% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?

Options:

A.

Routers that monitor network traffic flows between the CDE and out-of-scope networks.

B.

Firewalls that log all network traffic flows between the CDE and out-of-scope networks.

C.

Virtual LANs that route network traffic between the CDE and out-of-scope networks.

D.

A network configuration that prevents all network traffic between the CDE and out-of-scope networks.

Questions # 2:

If segmentation is being used to reduce the scope of a PCI DSS assessment, the assessor will?

Options:

A.

Verify the segmentation controls allow only necessary traffic into the cardholder data environment.

B.

Verify the payment card brands have approved the segmentation.

C.

Verify that approved devices and applications are used for the segmentation controls.

D.

Verify the controls used for segmentation are configured properly and functioning as intended.

Questions # 3:

What does the PCI PTS standard cover?

Options:

A.

Point-of-interaction devices used to protect account data.

B.

Secure coding practices for commercial payment applications.

C.

Development of strong cryptographic algorithms.

D.

End-to-end encryption solutions for transmission of account data.

Questions # 4:

Which of the following parties is responsible for completion of the Controls Matrix for the Customized Approach?

Options:

A.

Only a Qualified Security Assessor (QSA).

B.

Either a QSA, AQSA, or PCIP.

C.

Entity being assessed.

D.

Card brands or acquirer.

Questions # 5:

A network firewall has been configured with the latest vendor security patches. What additional configuration Is needed to harden the firewall?

Options:

A.

Remove the default "Firewall Administrator account and create a shared account for firewall administrators to use.

B.

Configure the firewall to permit all traffic until additional rules are defined.

C.

Synchronize the firewall rules with the other firewalls in the environment.

D.

Disable any firewall functions that are not needed in production.

Questions # 6:

Which of the following describes the intent of installing one primary function per server?

Options:

A.

To allow functions with different security levels to be implemented on the same server.

B.

To prevent server functions with a lower security level from introducing security weaknesses to higher-security functions on the same server.

C.

To allow higher-security functions to protect lower-security functions installed on the same server.

D.

To reduce the security level of functions with higher-security needs to meet the needs of lower-security functions.

Questions # 7:

Which of the following statements is true regarding track equivalent data on the chip of a payment card?

Options:

A.

It is allowed to be stored by merchants after authorization, if encrypted.

B.

It is sensitive authentication data.

C.

It is out of scope for PCI DSS.

D.

It is not applicable for PCI DSS Requirement 3.2.

Questions # 8:

Which of the following statements is true whenever a cryptographic key is retired and replaced with a new key?

Options:

A.

The retired key must not be used for encryption operations.

B.

Cryptographic key components from the retired key must be retained for 3 months before disposal.

C.

A new key custodian must be assigned.

D.

All data encrypted under the retired key must be securely destroyed.

Questions # 9:

The intent of assigning a risk ranking to vulnerabilities is to?

Options:

A.

Ensure all vulnerabilities are addressed within 30 days.

B.

Replace the need for quarterly ASV scans.

C.

Prioritize the highest risk items so they can be addressed more quickly.

D.

Ensure that critical security patches are installed at least quarterly.

Questions # 10:

Which of the following can be sampled for testing during a PCI DSS assessment?

Options:

A.

PCI DSS requirements and testing procedures.

B.

Compensating controls.

C.

Business facilities and system components.

D.

Security policies and procedures.

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.