Req 1 Flashcards

1
Q

Establish and implement firewall and router configuration standards

A

Requirement 1.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Build firewall and router configuration that restrict connections between untrusted networks and any system components in the cardholder data envirnment

A

Requirement 1.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Prohibit direct public access between the Internet and any system component in the cardholder data environment

A

Requirement 1.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Install personal firewall software or equivalent functionality on any portable computing devices (including company and/or employee-owed) that connect to the Internet when outside the network (for example, laptop used by employees), and which are also used to access the CDE.

A

Requirement 1.4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ensure that security policies and operational procedures for managing firewall are documented, in use, and known to all affected parties

A

Requirement 1.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A formal process for approving and testing all network connections and changes to firewall and router configurations.

A

Requirement 1.1.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Current network diagram that identifies all connections between the cardholder data environment and other networks, including any wireless networks.

A

Requirement 1.1.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Current diagram that shows all cardholder DATA FLOWS across systems and networks.

A

Requirement 1.1.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Requirements for a firewall at each Internet connection and between any demilitarized zone (DMZ) and the internal network zone.

A

Requirement 1.1.4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Description of groups, roles, and responsibilities for management of network components.

A

Requirement 1.1.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Documentation of business justification and approval for use of all service, protocols, and ports allowed, including documentation of security features implemented for those protocols considered to be insecure.

A

Requirement 1.1.6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Requirement to review firewall and router rule sets at least every SIX months

A

Requirement 1.1.7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.

A

Requirement 1.2.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secure and synchronize router configuration files.

A

Requirement 1.2.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Install perimeter firewalls between all wireless networks and the cardholder data environment, and configure these firewalls to deny or, if traffic is necessary for business purpose, permit only authorized traffic between the wireless environment and the cardholder data environment.

A

Requirement 1.2.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Implement a DMZ to limit inbound traffic to only system components that provide authorized publicly accessible services, protocols, and ports.

A

Requirement 1.3.1

17
Q

Limit inbound Internet traffic to IP addresses within the DMZ,

A

Requirement 1.3.2

18
Q

Implement anti-spoofing measure to detect and block forged source IP addresses from entering the network.

A

Requirement 1.3.3

19
Q

Do not allow unauthorized outbound traffic from the cardholder data environment.

A

Requirement 1.3.4

20
Q

Permit only “established” connection into the network.

A

Requirement 1.3.5

21
Q

Place system components that store cardholder data (such as a database) in an internals network zone, segregated from the DMZ and other untrusted networks.

A

Requirement 1.3.6

22
Q

Do not disclose private IP addresses and routing information to unauthorized parties.

A

Requirement 1.3.7