What should be examined to verify 1.1.2 is implemented?

Prepare for the PCI DSS Test with detailed questions and explanations. Use flashcards and quizzes to enhance knowledge. Ensure you're ready for your certification exam!

Multiple Choice

What should be examined to verify 1.1.2 is implemented?

Explanation:
Verifying 1.1.2 is about confirming that there are formal, documented controls for what network traffic is allowed to reach and leave the Cardholder Data Environment. The best thing to examine is the firewall and router configuration standards, because these documents specify the exact inbound and outbound traffic that is permitted, including ports, protocols, and the scope of the CDE. If these standards clearly identify what traffic is allowed to enter and exit the CDE, it shows that boundary controls are defined and enforced, which is essential for limiting exposure to only necessary connections. Other options don’t demonstrate this boundary-control focus: a policy that is unrelated to the CDE doesn’t prove actual implemented controls; requiring encryption for all outbound traffic isn’t the same as showing which traffic is permitted or denied through the network devices; and allowing inbound traffic unrestricted from trusted partners would contravene the principle of controlled access.

Verifying 1.1.2 is about confirming that there are formal, documented controls for what network traffic is allowed to reach and leave the Cardholder Data Environment. The best thing to examine is the firewall and router configuration standards, because these documents specify the exact inbound and outbound traffic that is permitted, including ports, protocols, and the scope of the CDE. If these standards clearly identify what traffic is allowed to enter and exit the CDE, it shows that boundary controls are defined and enforced, which is essential for limiting exposure to only necessary connections. Other options don’t demonstrate this boundary-control focus: a policy that is unrelated to the CDE doesn’t prove actual implemented controls; requiring encryption for all outbound traffic isn’t the same as showing which traffic is permitted or denied through the network devices; and allowing inbound traffic unrestricted from trusted partners would contravene the principle of controlled access.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy