New Year Special Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

QSA_New_V4 Qualified Security Assessor V4 Exam Questions and Answers

Questions 4

Which scenario meets PCI DSS requirements for restricting access to databases containing cardholder data?

Options:

A.

User access to the database Is only through programmatic methods.

B.

User access to the database Is restricted to system and network administrators.

C.

Application IDs for database applications can only be used by database administrators.

D.

Direct queries to the database are restricted to shared database administrator accounts.

Buy Now
Questions 5

Which of the following describes "stateful responses" to communication Initiated by a trusted network?

Options:

A.

Administrative access to respond to requests to change the firewall Is limited to one individual at a time.

B.

Active network connections are tracked so that invalid "response" traffic can be identified.

C.

A current baseline of application configurations is maintained and any mis-configuration is responded to promptly.

D.

Logs of user activity on the firewall are correlated to identify and respond to suspicious behavior.

Buy Now
Questions 6

An entity wants to know if the Software Security Framework can be leveraged during their assessment. Which of the following software types would this apply to?

Options:

A.

Any payment software In the CDE.

B.

Only software which runs on PCI PTS devices.

C.

Validated Payment Applications that are listed by PCI SSC and have undergone a PA-DSS assessment.

D.

Software developed by the entity in accordance with the Secure SLC Standard.

Buy Now
Questions 7

What do PCI DSS requirements for protecting cryptographic keys include?

Options:

A.

Public keys must be encrypted with a key-encrypting key.

B.

Data-encrypting keys must be stronger than the key-encrypting key that protects it.

C.

Private or secret keys must be encrypted, stored within an SCD, or stored as key components.

D.

Key-encrypting keys and data-encrypting keys must be assigned to the same key custodian.

Buy Now
Questions 8

An entity accepts e-commerce payment card transactions and stores account data in a database. The database server and the web server are both accessible from the Internet. The database server and the web server are on separate physical servers. What is required for the entity to meet PCI DSS requirements?

Options:

A.

The web server and the database server should be installed on the same physical server.

B.

The database server should be relocated so that it is not accessible from untrusted networks.

C.

The web server should be moved into the Internal network.

D.

The database server should be moved to a separate segment from the web server to allow for more concurrent connections.

Buy Now
Questions 9

Viewing of audit log files should be limited to?

Options:

A.

Individuals who performed the logged activity.

B.

Individuals with read/write access.

C.

Individuals with administrator privileges.

D.

Individuals with a job-related need.

Buy Now
Questions 10

Security policies and operational procedures should be?

Options:

A.

Encrypted with strong cryptography.

B.

Stored securely so that only management has access.

C.

Reviewed and updated at least quarterly.

D.

Distributed to and understood by ail affected parties.

Buy Now
Questions 11

An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA, while also ensuring that the customized control is implemented securely. Which of the following statements is true?

Options:

A.

You can assess the customized control, but another assessor must verify thatyou completed the TRA correctly.

B.

You can assess the customized control and verify that the customized approach was correctly followed, but you must document this in the ROC.

C.

You must document the work on the customized control in the ROC, but you can not assess the control or the documentation.

D.

Assessors are not allowed to assist an entity with the completion of the Controls Matrix or the TRA.

Buy Now
Questions 12

Which statement is true regarding the PCI DSS Report on Compliance (ROC)?

Options:

A.

The ROC Reporting Template and instructions provided by PCI SSC should be used for all ROCs.

B.

The assessor may use either their own template or the ROC Reporting Template provided by PCI SSC.

C.

The assessor must create their own ROC template tor each assessment report.

D.

The ROC Reporting Template provided by PCI SSC is only required for service provider assessments.

Buy Now
Exam Code: QSA_New_V4
Exam Name: Qualified Security Assessor V4 Exam
Last Update: Jan 6, 2025
Questions: 40
QSA_New_V4 pdf

QSA_New_V4 PDF

$25.5  $84.99
QSA_New_V4 Engine

QSA_New_V4 Testing Engine

$30  $99.99
QSA_New_V4 PDF + Engine

QSA_New_V4 PDF + Testing Engine

$40.5  $134.99