New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

QSA_New_V4 Qualified Security Assessor V4 Exam Questions and Answers

Questions 4

What do PCI DSS requirements for protecting cryptographic keys include?

Options:

A.

Public keys must be encrypted with a key-encrypting key.

B.

Data-encrypting keys must be stronger than the key-encrypting key that protects it.

C.

Private or secret keys must be encrypted, stored within an SCD, or stored as key components.

D.

Key-encrypting keys and data-encrypting keys must be assigned to the same key custodian.

Buy Now
Questions 5

Which of the following file types must be monitored by a change-detection mechanism (for example, a file-integrity monitoring tool)?

Options:

A.

Application vendor manuals

B.

Files that regularly change

C.

Security policy and procedure documents

D.

System configuration and parameter files

Buy Now
Questions 6

Which statement about the Attestation of Compliance (AOC) is correct?

Options:

A.

There are different AOC templates for service providers and merchants.

B.

The AOC must be signed by both the merchant/service provider and by PCI SSC.

C.

The same AOC template is used W ROCs and SAQs.

D.

The AOC must be signed by either the merchant/service provider or the QSA/ISA.

Buy Now
Questions 7

Which scenario meets PCI DSS requirements for restricting access to databases containing cardholder data?

Options:

A.

User access to the database Is only through programmatic methods.

B.

User access to the database Is restricted to system and network administrators.

C.

Application IDs for database applications can only be used by database administrators.

D.

Direct queries to the database are restricted to shared database administrator accounts.

Buy Now
Questions 8

A retail merchant has a server room containing systems that store encrypted PAN data. The merchant has Implemented a badge access-control system that Identifies who entered and exited the room, on what date, and at what time. There are no video cameras located in the server room.Based on this information, which statement is true regarding PCI DSS physical security requirements?

Options:

A.

The badge access-control system must be protected from tampering or disabling.

B.

The merchant must Install video cameras in addition to the existing access-control system.

C.

Data from the access-control system must be securely deleted on a monthly basis.

D.

The merchant must install motion-sensing alarms In addition to the existing access-control system.

Buy Now
Questions 9

An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TRA. During the assessment, you spend time completing the Controls Matrix and the TRA, while also ensuring that the customized control is implemented securely. Which of the following statements is true?

Options:

A.

You can assess the customized control, but another assessor must verify thatyou completed the TRA correctly.

B.

You can assess the customized control and verify that the customized approach was correctly followed, but you must document this in the ROC.

C.

You must document the work on the customized control in the ROC, but you can not assess the control or the documentation.

D.

Assessors are not allowed to assist an entity with the completion of the Controls Matrix or the TRA.

Buy Now
Questions 10

Which of the following is true regarding internal vulnerability scans?

Options:

A.

They must be performed after a significant change.

B.

They must be performed by an Approved Scanning Vendor (ASV).

C.

They must be performed by QSA personnel.

D.

They must be performed at least annually.

Buy Now
Questions 11

An LDAP server providing authentication services to the cardholder data environment is_____________?

Options:

A.

in scope for PCI DSS.

B.

not In scope for PCI DSS.

C.

in scope only if it stores, processes or transmits cardholder data.

D.

in scope only if itprovides authentication services to systems in the DMZ.

Buy Now
Questions 12

Which statement is true regarding the presence of both hashed and truncated versions of the same PAN in an environment?

Options:

A.

Controls are needed to prevent the original PAN being exposed by the hashed and truncated versions.

B.

The hashed version of the PAN must also be truncated per PCI DSS requirements for strong cryptography.

C.

The hashed and truncated versions must be correlated so the source PAN can be identified.

D.

Hashed and truncated versions of a PAN must not exist in same environment.

Buy Now
Exam Code: QSA_New_V4
Exam Name: Qualified Security Assessor V4 Exam
Last Update: Jan 6, 2025
Questions: 40
QSA_New_V4 pdf

QSA_New_V4 PDF

$25.5  $84.99
QSA_New_V4 Engine

QSA_New_V4 Testing Engine

$30  $99.99
QSA_New_V4 PDF + Engine

QSA_New_V4 PDF + Testing Engine

$40.5  $134.99