pci qsa-new-v4 practice test

Qualified Security Assessor V4 Exam

Last exam update: Nov 18 ,2025
Page 1 out of 3. Viewing questions 1-15 out of 40

Question 1

Which of the following is true regarding internal vulnerability scans?

  • A. They must be performed after a significant change.
  • B. They must be performed by an Approved Scanning Vendor (ASV).
  • C. They must be performed by QSA personnel.
  • D. They must be performed at least annually.
Mark Question:
Answer:

A


Explanation:
Comprehensive Detailed Step by Step Explanation with All PCI DSS and Qualified Security Assessor
V4 References
Relevant PCI DSS Requirement: Internal vulnerability scans are discussed under PCI DSS Requirement
11.3.1, which requires organizations to perform internal vulnerability scanning as part of their
regular vulnerability management process.
Frequency and Trigger for Internal Scans:
PCI DSS v4.0 explicitly states that internal vulnerability scans should be conducted at least quarterly
and after any significant change.
A "significant change" can include modifications such as infrastructure upgrades, addition of new
systems or software, and configuration changes that may impact security.
Approved Scanning Vendor (ASV):
Internal scans do not require an Approved Scanning Vendor (ASV). ASVs are specifically used for
external vulnerability scans.
Qualified Security Assessor (QSA) Involvement:
QSAs are not mandated to perform internal scans. Organizations can use internal teams or trusted
third-party resources for this purpose, provided the scans meet PCI DSS criteria.
Annual Scanning Misconception:
While annual compliance reports may include details of scanning activities, the requirement for
internal scans is at least quarterly and event-triggered, not annually.
Reference Verification:
Requirement 11.3.1 (PCI DSS v4.0): Clearly outlines the need for quarterly scans and post-significant-
change scans​​.
ROC and SAQ Templates: Reinforce the requirement that scans are both regular and reactive to
environmental changes​​.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

An entity wants to use the Customized Approach. They are unsure how to complete the Controls
Matrix or TR

  • A. You can assess the customized control, but another assessor must verify that you completed the TRA correctly.
  • B. You can assess the customized control and verify that the customized approach was correctly followed, but you must document this in the ROC.
  • C. You must document the work on the customized control in the ROC, but you can not assess the control or the documentation.
  • D. Assessors are not allowed to assist an entity with the completion of the Controls Matrix or the TRA.
Mark Question:
Answer:

B


Explanation:
​ Customized Approach Overview:
Under PCI DSS v4.0, entities can use a Customized Approach to meet requirements by implementing
controls tailored to their environment. This allows flexibility while still achieving the intent of the
security requirement.
​ Role of Assessors:
Assessors (QSAs) are responsible for evaluating both the implementation of customized controls and
ensuring these controls fulfill the security objectives of the PCI DSS requirements​​.
QSAs must document the evaluation, evidence reviewed, and results in the Report on Compliance
(ROC).
​ Controls Matrix and Targeted Risk Analysis (TRA):
The Controls Matrix and TRA are key components of the Customized Approach. QSAs assist in
verifying the accuracy and completeness of these tools during assessments​​.
​ Documenting in the ROC:
The ROC must include a narrative explaining the assessor’s findings regarding the customized control,
validation methods, and any evidence collected​.
​ Relevant PCI DSS v4.0 Guidance:
Appendix D and E of the PCI DSS v4.0 ROC Template emphasize that QSAs can evaluate and confirm
adherence to the Customized Approach provided this is documented comprehensively in the ROC​.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Security policies and operational procedures should be?

  • A. Encrypted with strong cryptography.
  • B. Stored securely so that only management has access.
  • C. Reviewed and updated at least quarterly.
  • D. Distributed to and understood by ail affected parties.
Mark Question:
Answer:

D


Explanation:
​ Requirement Context:
PCI DSS Requirement 12.5 mandates that security policies and operational procedures are not only
documented but also distributed to relevant parties to ensure clarity and compliance.
​ Importance of Distribution and Awareness:
All affected parties, including employees, contractors, and third parties with access to the cardholder
data environment (CDE), must receive and understand the policies. This ensures they adhere to the
security measures​​.
​ Review and Updates:
Security policies must be kept up to date and reviewed at least annually or after significant changes
in the environment. While other options such as encryption or restricted access are important for
security, the critical focus is on distribution and awareness to ensure operational effectiveness​​.
​ Testing and Validation:
During assessments, QSAs validate the implementation by examining training records,
communication logs, and acknowledgment forms signed by affected parties​​.
​ Relevant PCI DSS v4.0 Guidance:
Section 12.5.1 of PCI DSS v4.0 outlines that the dissemination of policies must ensure that all
personnel understand their roles in securing the environment​​.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Which of the following is true regarding compensating controls?

  • A. A compensating control is not necessary if all other PCI DSS requirements are in place.
  • B. A compensating control must address the risk associated with not adhering to the PCI DSS requirement.
  • C. An existing PCI DSS requirement can be used as compensating control if it is already implemented.
  • D. A compensating control worksheet is not required if the acquirer approves the compensating control.
Mark Question:
Answer:

B


Explanation:
​ Compensating Controls Definition and Purpose
A compensating control is an alternate measure that satisfies the intent of a specific PCI DSS
requirement and provides an equivalent level of security.
The rationale and risk mitigation must be explicitly documented using the Compensating Control
Worksheet (CCW).
​ Mandatory Documentation
PCI DSS v4.0 mandates the use of a CCW when implementing compensating controls. This applies
regardless of acquirer approvals​​.
The CCW requires detailed documentation including:
Constraints preventing the original requirement from being implemented.
Justification for the compensating control.
Description of the control and evidence of its effectiveness.
​ Using Existing Requirements
If an existing PCI DSS requirement (e.g., Requirement 5 for antivirus) is already implemented and can
mitigate the risks of not meeting another requirement, it may qualify as a compensating control​​.
​ Approval and Review Process
QSAs must validate the implementation, effectiveness, and appropriateness of compensating
controls during the assessment process​

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Where an entity under assessment is using the customized approach, which of the following steps is
the responsibility of the assessor?

  • A. Monitor the control.
  • B. Derive testing procedures and document them in Appendix E of the ROC.
  • C. Document and maintain evidence about each customized control as defined in Appendix E of PCI DSS.
  • D. Perform the targeted risk analysis as per PCI DSS requirement 12.3.2.
Mark Question:
Answer:

C


Explanation:
​ Customized Approach Overview
Appendix E of PCI DSS v4.0 outlines the customized approach, which allows entities to demonstrate
their control effectiveness using methods that differ from the defined approach.
​ Assessor Responsibilities
QSAs must document and maintain detailed evidence for each customized control implemented by
the entity.
Evidence must support how the customized control meets the security objectives of the original
requirement​​.
​ Testing and Validation
The QSA must perform validation to confirm the customized control’s adequacy and effectiveness
and ensure it sufficiently addresses the requirement’s intent.
​ Documentation
All findings, testing procedures, and conclusions must be recorded in the Report on Compliance
(ROC) Appendix E, providing traceability and transparency​​.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which statement is true regarding the PCI DSS Report on Compliance (ROC)?

  • A. The ROC Reporting Template and instructions provided by PCI SSC should be used for all ROCs.
  • B. The assessor may use either their own template or the ROC Reporting Template provided by PCI SSC.
  • C. The assessor must create their own ROC template tor each assessment report.
  • D. The ROC Reporting Template provided by PCI SSC is only required for service provider assessments.
Mark Question:
Answer:

A


Explanation:
​ Mandatory ROC Template
PCI DSS v4.0 mandates the use of the PCI SSC-provided ROC Template for all Reports on Compliance​​.
This ensures standardization, completeness, and accuracy in documenting compliance assessments.
​ Sections of the ROC Template
The ROC includes mandatory sections:
Assessment Overview: General details, scope validation, and assessment findings.
Findings and Observations: Detailed compliance status per requirement.
​ Prohibited Practices
Assessors cannot use self-created ROC templates. Deviation from the PCI SSC-approved template
may result in rejection of the report​​.
​ Key Changes in v4.0
Enhanced focus on the integrity of reporting and inclusion of specific findings to ensure alignment
with PCI DSS objectives.
Added support for the customized approach within the ROC structure​​.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which of the following statements Is true whenever a cryptographic key Is retired and replaced with
a new key?

  • A. The retired key must not be used for encryption operations.
  • B. Cryptographic key components from the retired key must be retained for 3 months before disposal.
  • C. Anew key custodian must be assigned.
  • D. All data encrypted under the retired key must be securely destroyed.
Mark Question:
Answer:

A


Explanation:
​ Key Management Requirements:
PCI DSS Requirement 3.6.5 specifies that when a cryptographic key is retired, it must no longer be
used for encryption operations but may still be retained for decryption purposes as needed (e.g., to
decrypt historical data until it is re-encrypted with the new key)​.
​ Secure Key Retirement:
Retired keys should be securely stored or destroyed based on the organization’s key management
policy to prevent unauthorized access or misuse.
​ Reference in PCI DSS Documentation:
Section 3.6.5 emphasizes that retired keys must be rendered inactive for further encryption while
allowing use for decryption, ensuring data continuity and compliance​.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which of the following statements Is true whenever a cryptographic key Is retired and replaced with
a new key?

  • A. The retired key must not be used for encryption operations.
  • B. Cryptographic key components from the retired key must be retained for 3 months before disposal.
  • C. Anew key custodian must be assigned.
  • D. All data encrypted under the retired key must be securely destroyed.
Mark Question:
Answer:

A


Explanation:
​ Key Management Requirements:
PCI DSS Requirement 3.6.5 specifies that when a cryptographic key is retired, it must no longer be
used for encryption operations but may still be retained for decryption purposes as needed (e.g., to
decrypt historical data until it is re-encrypted with the new key)​.
​ Secure Key Retirement:
Retired keys should be securely stored or destroyed based on the organization’s key management
policy to prevent unauthorized access or misuse.
​ Reference in PCI DSS Documentation:
Section 3.6.5 emphasizes that retired keys must be rendered inactive for further encryption while
allowing use for decryption, ensuring data continuity and compliance​.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

In the ROC Reporting Template, which of the following Is the best approach for a response where the
requirement was "In Place’?

  • A. Details of the entity's project plan for implementing the requirement.
  • B. Details of how the assessor observed the entity's systems were compliant with the requirement.
  • C. Details of the entity's reason for not implementing the requirement
  • D. Details of how the assessor observed the entity's systems were not compliant with the requirement
Mark Question:
Answer:

B


Explanation:
​ PCI DSS Reporting Expectations:
When documenting that a requirement is "In Place," the ROC must clearly describe how compliance
was validated by the assessor. This involves detailing the evidence observed, such as system
configurations, documentation, and personnel interviews​.
​ ROC Documentation Guidelines:
The ROC Reporting Template specifies that each "In Place" response must include evidence
demonstrating compliance with the requirement, such as testing observations and validation of
implemented controls​.
​ Eliminating Incorrect Options:
A: Project plans are not sufficient to demonstrate current compliance.
C/D: Responses discussing non-implementation or non-compliance are irrelevant when the
requirement is "In Place."
​ PCI DSS v4.0 ROC Template Guidance:
Appendix sections in the ROC provide specific instructions for assessors to document the testing
performed, evidence reviewed, and results​.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

What should the assessor verify when testing that cardholder data Is protected whenever It Is sent
over open public networks?

  • A. The security protocol Is configured to accept all digital certificates.
  • B. A proprietary security protocol is used.
  • C. The security protocol accepts only trusted keys.
  • D. The security protocol accepts connections from systems with lower encryption strength than required by the protocol.
Mark Question:
Answer:

C


Explanation:
​ Requirement for Secure Transmission:
PCI DSS Requirement 4.1 mandates that cardholder data sent over open public networks must be
protected with strong cryptographic protocols. Accepting only trusted keys ensures data integrity and
prevents unauthorized access​​.
​ Key Validation Practices:
Trusted keys and certificates are verified to ensure authenticity. Using untrusted keys compromises
the security of the encrypted communication.
​ Prohibited Practices:
A/D: Configuring protocols to accept all certificates or lower encryption strength violates PCI DSS
encryption guidelines.
B: Proprietary protocols are not inherently compliant unless they meet strong cryptographic
standards.
​ Testing and Verification:
Assessors verify the implementation of trusted keys by examining encryption settings, reviewing
certificate chains, and conducting tests to confirm only trusted connections are accepted​​.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following file types must be monitored by a change-detection mechanism (for example,
a file-integrity monitoring tool)?

  • A. Application vendor manuals
  • B. Files that regularly change
  • C. Security policy and procedure documents
  • D. System configuration and parameter files
Mark Question:
Answer:

D


Explanation:
​ Scope of Change-Detection Mechanisms
PCI DSS v4.0 requires the implementation of a change-detection mechanism (e.g., file-integrity
monitoring) to monitor unauthorized changes to critical files.
Critical files include system configuration and parameter files, application executable files, and
scripts used in administrative functions​​.
​ Intent of Monitoring System Files
These files often control security settings and operational parameters of systems within the
Cardholder Data Environment (CDE). Unauthorized changes could compromise system security.
​ Exclusions
Documents like application vendor manuals and security policies do not qualify as files requiring
integrity monitoring since they do not directly impact the security posture or operational functions of
systems in the CDE.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Which scenario describes segmentation of the cardholder data environment (CDE) for the purposes
of reducing PCI DSS scope?

  • A. Routers that monitor network traffic flows between the CDE and out-of-scope networks.
  • B. Firewalls that log all network traffic flows between the CDE and out-of-scope networks.
  • C. Virtual LANs that route network traffic between the CDE and out-of-scope networks.
  • D. A network configuration that prevents all network traffic between the CDE and out-of-scope networks.
Mark Question:
Answer:

D


Explanation:
​ Segmentation Defined
PCI DSS v4.0 specifies that effective segmentation separates the CDE from out-of-scope
environments, minimizing the risk of unauthorized access to cardholder data​.
​ Key Requirements for Segmentation
Network traffic between the CDE and out-of-scope networks must be completely prevented. This
ensures that out-of-scope systems cannot introduce risks to the CDE.
Methods like firewalls, ACLs (Access Control Lists), and other technologies may be used to enforce
segmentation.
​ Incorrect Options
Monitoring or logging traffic (Options A and B) without preventing access does not achieve
segmentation.
Virtual LANs (Option C) alone are insufficient unless properly configured to enforce traffic isolation​​.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

What is the intent of classifying media that contains cardholder data?

  • A. Ensuring that media is properly protected according to the sensitivity of the data it contains.
  • B. Ensuring that media containing cardholder data Is moved from secured areas an a quarterly basis.
  • C. Ensuring that media is clearly and visibly labeled as "Confidential" so all personnel know that the media contains cardholder data.
  • D. Ensuring that all media is consistently destroyed on the same schedule, regardless of the contents.
Mark Question:
Answer:

A


Explanation:
​ Purpose of Classifying Media
PCI DSS v4.0 emphasizes the need to classify media based on the sensitivity of the data it contains.
Media classification ensures appropriate handling, storage, and destruction processes​​.
​ Media Protection Requirements
Media containing cardholder data must be securely stored, transferred, and destroyed when no
longer needed.
Classification informs the level of protection required, such as encryption, physical security, or
controlled access​​.
​ Incorrect Options
Option B: Moving media quarterly is not a requirement.
Option C: Labeling as "Confidential" is insufficient without a comprehensive protection strategy.
Option D: Destruction schedules should depend on retention requirements and data sensitivity, not a
universal timeline.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which statement is true regarding the use of intrusion detection techniques, such as intrusion
detection systems and/or Intrusion protection systems (IDS/IPS)?

  • A. Intrusion detection techniques are required on all system components.
  • B. Intrusion detection techniques are required to alert personnel of suspected compromises.
  • C. Intrusion detection techniques are required to isolate systems in the cardholder data environment from all other systems
  • D. Intrusion detection techniques are required to identify all instances of cardholder data.
Mark Question:
Answer:

B


Explanation:
​ PCI DSS Requirement:
Requirement 11.4 mandates the implementation of intrusion detection and/or intrusion prevention
techniques to alert personnel of suspected compromises within the cardholder data environment
(CDE).
​ Purpose of IDS/IPS:
These systems are deployed to identify potential threats and alert relevant personnel, enabling them
to take corrective actions to prevent data breaches​.
​ Rationale Behind Correct Answer:
A: Intrusion detection is required only for in-scope components, not all system components.
C/D: Intrusion detection systems do not perform isolation or identification of all cardholder data;
they monitor for and alert on potential intrusions​​.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Which scenario meets PCI DSS requirements for critical systems to have correct and consistent time?

  • A. Each Internal system Is configured to be Its own time server.
  • B. Access to time configuration settings is available to all users of the system.
  • C. Central time servers receive time signals from specific, approved external sources.
  • D. Each internal system peers directly with an external source to ensure accuracy of time updates.
Mark Question:
Answer:

C


Explanation:
​ Time Synchronization Standards:
PCI DSS Requirement 10.4 mandates that all critical systems use a centralized time server to ensure
time accuracy across systems. Approved external sources provide a reliable and consistent time
signal.
​ Correctness and Consistency of Time:
Using a central time server ensures uniformity of timestamps, which is critical for forensic analysis,
log correlation, and monitoring activities​​.
​ Invalid Options:
A: Internal systems acting as their own servers could lead to inconsistent timestamps.
B: Allowing all users access to time settings poses a security risk.
D: Peering directly with external sources bypasses centralized control, violating consistency
requirements.

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2