Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Assessor_New_V4 Exam

Last Update 4 hours ago Total Questions : 60

The Assessor_New_V4 Exam content is now fully updated, with all current exam questions added 4 hours ago. Deciding to include Assessor_New_V4 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our Assessor_New_V4 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these Assessor_New_V4 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Assessor_New_V4 Exam practice test comfortably within the allotted time.

Question # 11

In accordance with PCI DSS Requirement 10. how long must audit logs be retained?

A.

At least 1 year, with the most recent 3 months immediately available

B.

At least 2 years, with the most recent 3 months immediately available

C.

At least 2 years with the most recent month immediately available

D.

At least 3 months with the most recent month immediately available

Question # 12

Which of the following is a requirement for multi-tenant service providers?

A.

Ensure that customers cannot access another entity s cardholder data environment

B.

Provide customers with access to the hosting provider s system configuration files.

C.

Provide customers with a shared user ID for access to critical system binaries

D.

Ensure that a customer's log files are available to all hosted entities

Question # 13

Which of the following meets the definition of 'quarterly' as indicated in the description of timeframes used in PCI DSS requirements?

A.

Occurring at some point in each quarter of a year

B.

At least once every 95 97 days.

C.

On the 15th of each third month

D.

On the 1st of each fourth month

Question # 14

According to requirement 1, what is the purpose of "Network Security Controls?

A.

Manage anti-malware throughout the CDE.

B.

Control network traffic between two or more logical or physical network segments.

C.

Discover vulnerabilities and rank them

D.

Encrypt PAN when stored

Question # 15

An entity is using custom software in their CDE. The custom software was developed using processes that were assessed by a Secure Software Lifecycle assessor and found to be fully compliant with the Secure SLC standard. What impact will this have on the entity's PCI DSS assessment?

A.

It automatically makes an entity PCI DSS compliant

B.

It may help the entity to meet several requirements in Requirement 6.

C.

There is no impact to the entity

D.

The custom software can be excluded from the PCI DSS assessment

Question # 16

Which of the following is true regarding internal vulnerability scans?

A.

They must be performed after a significant change

B.

They must be performed by an Approved Scanning Vendor (ASV)

C.

They must be performed by QSA personnel

D.

They must be performed at least annually

Question # 17

If an entity shares cardholder data with a TPSP, what activity is the entity required to perform'?

A.

The entity must conduct ASV scans on the TPSP's systems at least annually

B.

The entity must perform a risk assessment of the TPSP's environment at least quarterly.

C.

The entity must test the TPSP's incident response plan at least quarterly

D.

The entity must monitor the TPSP's PCI DSS compliance status at least annually

Question # 18

Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes of reducing PCI DSS scope?

A.

Routers that monitor network traffic flows between the CDE and out-of-scope networks

B.

Firewalls that log all network traffic flows between the CDE and out of-scope networks

C.

Virtual LANs that route network traffic between the CDE and out-of-scope networks

D.

A network configuration that prevents all network traffic between the CDE and out-of-scope networks

Go to page: