Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

QSA_New_V4 Exam Dumps - PCI SSC PCI Qualified Professionals Questions and Answers

Question # 4

A network firewall has been configured with the latest vendor security patches. What additional configuration Is needed to harden the firewall?

Options:

A.

Remove the default "Firewall Administrator account and create a shared account for firewall administrators to use.

B.

Configure the firewall to permit all traffic until additional rules are defined.

C.

Synchronize the firewall rules with the other firewalls in the environment.

D.

Disable any firewall functions that are not needed in production.

Buy Now
Question # 5

Viewing of audit log files should be limited to?

Options:

A.

Individuals who performed the logged activity.

B.

Individuals with read/write access.

C.

Individuals with administrator privileges.

D.

Individuals with a job-related need.

Buy Now
Question # 6

Which of the following is true regarding compensating controls?

Options:

A.

A compensating control is not necessary if all other PCI DSS requirements are in place.

B.

A compensating control must address the risk associated with not adhering to the PCI DSS requirement.

C.

An existing PCI DSS requirement can be used as compensating control if it is already implemented.

D.

A compensating control worksheet is not required if the acquirer approves the compensating control.

Buy Now
Question # 7

What should the assessor verify when testing that cardholder data Is protected whenever It Is sent over open public networks?

Options:

A.

The security protocol Is configured to accept all digital certificates.

B.

A proprietary security protocol is used.

C.

The security protocol accepts only trusted keys.

D.

The security protocol accepts connections from systems with lower encryption strength than required by the protocol.

Buy Now
Question # 8

Which of the following statements Is true whenever a cryptographic key Is retired and replaced with a new key?

Options:

A.

The retired key must not be used for encryption operations.

B.

Cryptographic key components from the retired key must be retained for 3 months before disposal.

C.

Anew key custodian must be assigned.

D.

All data encrypted under the retired key must be securely destroyed.

Buy Now
Question # 9

Which of the following is true regarding internal vulnerability scans?

Options:

A.

They must be performed after a significant change.

B.

They must be performed by an Approved Scanning Vendor (ASV).

C.

They must be performed by QSA personnel.

D.

They must be performed at least annually.

Buy Now
Question # 10

An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA, while also ensuring that the customized control is implemented securely. Which of the following statements is true?

Options:

A.

You can assess the customized control, but another assessor must verify thatyou completed the TRA correctly.

B.

You can assess the customized control and verify that the customized approach was correctly followed, but you must document this in the ROC.

C.

You must document the work on the customized control in the ROC, but you can not assess the control or the documentation.

D.

Assessors are not allowed to assist an entity with the completion of the Controls Matrix or the TRA.

Buy Now
Question # 11

Security policies and operational procedures should be?

Options:

A.

Encrypted with strong cryptography.

B.

Stored securely so that only management has access.

C.

Reviewed and updated at least quarterly.

D.

Distributed to and understood by ail affected parties.

Buy Now
Question # 12

Which of the following statements Is true whenever a cryptographic key Is retired and replaced with a new key?

Options:

A.

The retired key must not be used for encryption operations.

B.

Cryptographic key components from the retired key must be retained for 3 months before disposal.

C.

Anew key custodian must be assigned.

D.

All data encrypted under the retired key must be securely destroyed.

Buy Now
Question # 13

Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?

Options:

A.

Routers that monitor network traffic flows between the CDE and out-of-scope networks.

B.

Firewalls that log all network traffic flows between the CDE and out-of-scope networks.

C.

Virtual LANs that route network traffic between the CDE and out-of-scope networks.

D.

A network configuration that prevents all network traffic between the CDE and out-of-scope networks.

Buy Now
Exam Code: QSA_New_V4
Exam Name: Qualified Security Assessor V4 Exam
Last Update: Feb 22, 2025
Questions: 40
QSA_New_V4 pdf

QSA_New_V4 PDF

$25.5  $84.99
QSA_New_V4 Engine

QSA_New_V4 Testing Engine

$28.5  $94.99
QSA_New_V4 PDF + Engine

QSA_New_V4 PDF + Testing Engine

$40.5  $134.99