Big Cyber Monday Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

QSA_New_V4 Qualified Security Assessor V4 Exam Questions and Answers

Questions 4

An entity wants to know if the Software Security Framework can be leveraged during their assessment. Which of the following software types would this apply to?

Options:

A.

Any payment software in the CDE.

B.

Only software which runs on PCI PTS devices.

C.

Validated Payment Applications that are listed by PCI SSC and have undergone a PA-DSS assessment.

D.

Software developed by the entity in accordance with the Secure SLC Standard.

Buy Now
Questions 5

What should the assessor verify when testing that cardholder data Is protected whenever It Is sent over open public networks?

Options:

A.

The security protocol Is configured to accept all digital certificates.

B.

A proprietary security protocol is used.

C.

The security protocol accepts only trusted keys.

D.

The security protocol accepts connections from systems with lower encryption strength than required by the protocol.

Buy Now
Questions 6

What must the assessor verify when testing that PAN is protected whenever it is sent over the Internet?

Options:

A.

The security protocol is configured to support earlier versions.

B.

The PAN is encrypted with strong cryptography.

C.

The security protocol is configured to accept all digital certificates.

D.

The PAN is securely deleted once the transmission has been sent.

Buy Now
Questions 7

Which statement is true regarding the use of intrusion detection techniques, such as intrusion detection systems and/or intrusion protection systems (IDS/IPS)?

Options:

A.

Intrusion detection techniques are required on all system components.

B.

Intrusion detection techniques are required to alert personnel of suspected compromises.

C.

Intrusion detection techniques are required to isolate systems in the cardholder data environment from all other systems.

D.

Intrusion detection techniques are required to identify all instances of cardholder data.

Buy Now
Questions 8

If disk encryption is used to protect account data, what requirement should be met for the disk encryption solution?

Options:

A.

Access to the disk encryption must be managed independently of the operating system access control mechanisms.

B.

The disk encryption system must use the same user account authenticator as the operating system.

C.

The decryption keys must be associated with the local user account database.

D.

The decryption keys must be stored within the local user account database.

Buy Now
Questions 9

An entity accepts e-commerce payment card transactions and stores account data in a database. The database server and the web server are both accessible from the Internet. The database server and the web server are on separate physical servers. What is required for the entity to meet PCI DSS requirements?

Options:

A.

The web server and the database server should be installed on the same physical server.

B.

The database server should be relocated so that it is not accessible from untrusted networks.

C.

The web server should be moved into the internal network.

D.

The database server should be moved to a separate segment from the web server to allow for more concurrent connections.

Buy Now
Questions 10

Viewing of audit log files should be limited to?

Options:

A.

Individuals who performed the logged activity.

B.

Individuals with read/write access.

C.

Individuals with administrator privileges.

D.

Individuals with a job-related need.

Buy Now
Questions 11

Which of the following parties is responsible for completion of the Controls Matrix for the Customized Approach?

Options:

A.

Only a Qualified Security Assessor (QSA).

B.

Either a QSA, AQSA, or PCIP.

C.

Entity being assessed.

D.

Card brands or acquirer.

Buy Now
Questions 12

Which of the following file types must be monitored by a change-detection mechanism (for example, a file-integrity monitoring tool)?

Options:

A.

Application vendor manuals

B.

Files that regularly change

C.

Security policy and procedure documents

D.

System configuration and parameter files

Buy Now
Questions 13

A "Partial Assessment" is a new assessment result. What is a “Partial Assessment"?

Options:

A.

A ROC that has been completed after using an SAQ to determine which requirements should be tested, as per FAQ 1331.

B.

An interim result before the final ROC has been completed.

C.

A term used by payment brands and acquirers to describe entities that have multiple payment channels, with each channel having its own assessment.

D.

An assessment with at least one requirement marked as “Not Tested".

Buy Now
Questions 14

A sample of business facilities is reviewed during the PCI DSS assessment. What is the assessor required to validate about the sample?

Options:

A.

It includes a consistent set of facilities that are reviewed for all assessments.

B.

The number of facilities in the sample is at least 10 percent of the total number of facilities.

C.

Every facility where cardholder data is stored is reviewed.

D.

All types and locations of facilities are represented.

Buy Now
Questions 15

In the ROC Reporting Template, which of the following Is the best approach for a response where the requirement was "In Place’?

Options:

A.

Details of the entity's project plan for implementing the requirement.

B.

Details of how the assessor observed the entity's systems were compliant with the requirement.

C.

Details of the entity's reason for not implementing the requirement

D.

Details of how the assessor observed the entity's systems were not compliant with the requirement

Buy Now
Questions 16

According to Requirement 1, what is the purpose of “Network Security Controls"?

Options:

A.

Manage anti-malware throughout the CDE.

B.

Control network traffic between two or more logical or physical network segments.

C.

Discover vulnerabilities and rank them.

D.

Encrypt PAN when stored.

Buy Now
Questions 17

Which of the following is true regarding compensating controls?

Options:

A.

A compensating control is not necessary if all other PCI DSS requirements are in place.

B.

A compensating control must address the risk associated with not adhering to the PCI DSS requirement.

C.

An existing PCI DSS requirement can be used as a compensating control if it is already implemented.

D.

A compensating control worksheet is not required if the acquirer approves the compensating control.

Buy Now
Questions 18

Which of the following statements is true whenever a cryptographic key is retired and replaced with a new key?

Options:

A.

The retired key must not be used for encryption operations.

B.

Cryptographic key components from the retired key must be retained for 3 months before disposal.

C.

A new key custodian must be assigned.

D.

All data encrypted under the retired key must be securely destroyed.

Buy Now
Questions 19

If an entity shares cardholder data with a TPSP, what activity is the entity required to perform?

Options:

A.

The entity must conduct ASV scans on the TPSP’s systems at least annually.

B.

The entity must perform a risk assessment of the TPSP's environment at least quarterly.

C.

The entity must test the TPSP's incident response plan at least quarterly.

D.

The entity must monitor the TPSP’s PCI DSS compliance status at least annually.

Buy Now
Questions 20

Which systems must have anti-malware solutions?

Options:

A.

All CDE systems, connected systems. NSCs, and security-providing systems.

B.

All portable electronic storage.

C.

All systems that store PAN.

D.

Any in-scope system except for those identified as 'not at risk' from malware.

Buy Now
Questions 21

Which of the following describes "stateful responses" to communication Initiated by a trusted network?

Options:

A.

Administrative access to respond to requests to change the firewall Is limited to one individual at a time.

B.

Active network connections are tracked so that invalid "response" traffic can be identified.

C.

A current baseline of application configurations is maintained and any mis-configuration is responded to promptly.

D.

Logs of user activity on the firewall are correlated to identify and respond to suspicious behavior.

Buy Now
Questions 22

According to the glossary, "bespoke and custom software” describes which type of software?

Options:

A.

Any software developed by a third party.

B.

Any software developed by a third party that can be customized by an entity.

C.

Software developed by an entity for the entity’s own use.

D.

Virtual payment terminals.

Buy Now
Exam Code: QSA_New_V4
Exam Name: Qualified Security Assessor V4 Exam
Last Update: Dec 5, 2025
Questions: 75

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99