PCI SSC Assessor_New_V4 Sample Questions:
1. What should the assessor verify when testing that cardholder data is protected whenever it is sent over open public networks?
A) The security protocol is configured to accept all digital certificates
B) A proprietary security protocol is used
C) The security protocol accepts connections from systems with lower encryption strength than required by the protocol
D) The security protocol accepts only trusted keys
2. What does the PCI PTS standard cover?
A) Point-of-interaction devices used to protect account data
B) Secure coding practices for commercial payment applications.
C) Development of strong cryptographic algorithms
D) End-to-end encryption solutions for transmission of account data
3. Could an entity use both the Customized Approach and the Defined Approach to meet the same requirement?
A) Yes if the entity uses no compensating controls
B) Yes if the entity is eligible to use both approaches
C) No. because only compensating controls can be used with the Defined Approach
D) No because a single approach must be selected
4. An entity accepts e-commerce payment card transactions and stores account data in a database The database server and the web server are both accessible from the Internet The database server and the web server are on separate physical servers. What is required for the entity to meet PCI DSS requirements7
A) The web server should be moved into the internal network
B) The database server should be moved to a separate segment from the web server to allow for more concurrent connections
C) The database server should be relocated so that it is not accessible from untrusted networks
D) The web server and the database server should be installed on the same physical server
5. What must the assessor verify when testing that PAN is protected whenever it is sent over the Internet?
A) The security protocol is configured to accept all digital certificates
B) The PAN is securely deleted once the transmission has been sent
C) The PAN is encrypted with strong cryptography
D) The security protocol is configured to support earlier versions
Solutions:
Question # 1 Answer: D | Question # 2 Answer: A | Question # 3 Answer: A | Question # 4 Answer: C | Question # 5 Answer: C |