PCI SSC ASSESSOR_NEW_V4 Assessor_New_V4 – Assessor_New_V4 Exam Online Training
PCI SSC ASSESSOR_NEW_V4 Online Training
The questions for ASSESSOR_NEW_V4 were last updated at Mar 10,2025.
- Exam Code: ASSESSOR_NEW_V4
- Exam Name: Assessor_New_V4 - Assessor_New_V4 Exam
- Certification Provider: PCI SSC
- Latest update: Mar 10,2025
In the ROC Repotting Template, which of the following is the best approach for a response where the requirement was in Place’’?
- A . Details of the entity s project plan for implementing the requirement
- B . Details of how the assessor observed the entity s systems were compliant with the requirement
- C . Details of the entity s reason for not implementing the requirement
- D . Details of how the assessor observed the entity s systems were not compliant with the requirement
An entity accepts e-commerce payment card transactions and stores account data in a database The database server and the web server are both accessible from the Internet The database server and the web server are on separate physical servers.
What is required for the entity to meet PCI DSS requirements7
- A . The web server and the database server should be installed on the same physical server
- B . The database server should be relocated so that it is not accessible from untrusted networks
- C . The web server should be moved into the internal network
- D . The database server should be moved to a separate segment from the web server to allow for more
concurrent connections
An organization has implemented a change-detection mechanism on their systems.
How often must critical file comparisons be performed?
- A . At least weekly
- B . Periodically as defined by the entity
- C . Only after a valid change is installed
- D . At least monthly
Which statement is true regarding the use of intrusion detection techniques, such as intrusion detection systems and/or intrusion protection systems (IDS’IPS)?
- A . Intrusion detection techniques are required on all system components
- B . Intrusion detection techniques are required to alert personnel of suspected compromises
- C . Intrusion detection techniques are required to isolate systems in the cardholder data environment from all other systems
- D . Intrusion detection techniques are required to identify all instances of cardholder data
Which of the following statements is true whenever a cryptographic key is retired and replaced with a new key?
- A . The retired key must not be used for encryption operations
- B . Cryptographic key components from the retired key must be retained for 3 months before disposal
- C . A new key custodian must be assigned
- D . All data encrypted under the retired key must be securely destroyed
What should the assessor verify when testing that cardholder data is protected whenever it is sent over open public networks?
- A . The security protocol is configured to accept all digital certificates
- B . A proprietary security protocol is used
- C . The security protocol accepts only trusted keys
- D . The security protocol accepts connections from systems with lower encryption strength than
required by the protocol
What must be included m an organization’s procedures for managing visitors?
- A . Visitors are escorted at all times within areas where cardholder data is processed or maintained
- B . Visitor badges are identical to badges used by onsite personnel
- C . Visitor log includes visitor name, address, and contact phone number
- D . Visitors retain their identification (for example a visitor badge) for 30 days after completion of the visit
According to the glossary, bespoke and custom software describes which type of software?
- A . Any software developed by a third party
- B . Any software developed by a third party that can be customized by an entity.
- C . Software developed by an entity for the entity’s own use
- D . Virtual payment terminals
Which statement about PAN is true?
- A . It must be protected with strong cryptography for transmission over private wireless networks
- B . It must be protected with strong cryptography (or transmission over private wired networks
- C . It does not require protection for transmission over public wireless networks
- D . It does not require protection for transmission over public wired networks
A "Partial Assessment is a new assessment result What is a ‘Partial Assessment’?
- A . A ROC that has been completed after using an SAQ to determine which requirements should be tested. As per FAQ 1331. (As long as the entity meets the SAQs eligibility criteria)
- B . An interim result before the final ROC has been completed
- C . A term used by payment brands and acquirers to describe entities that have multiple payment channels with each channel having its own assessment
- D . An assessment with at least one requirement marked as Not Tested”