According toRequirement 1.2.1of PCI DSS v4.0.1, network security controls (NSCs), such as firewalls and segmentation controls, are used torestrict and control trafficbetween trusted and untrusted networks. This includes logical or physical network segmentation.
Option A:Incorrect. Anti-malware is addressed in Requirement 5.
Option B:Correct. NSCs control and restrict inbound and outbound traffic between logical and physical network segments.
Option C:Incorrect. Vulnerability management is under Requirement 6.
Option D:Incorrect. PAN encryption is covered in Requirement 3.5.
Which of the following is a requirement for multi-tenant service providers?
Options:
A.
Ensure that customers cannot access another entity’s cardholder data environment.
B.
Provide customers with access to the hosting provider's system configuration files.
C.
Provide customers with a shared user ID for access to critical system binaries.
D.
Ensure that a customer’s log files are available to all hosted entities.
Answer:
A
Explanation:
Formulti-tenant service providers,isolation and segmentationare critical. As perRequirement 12.10.3, each customer’s environment must besegregated and protectedsuch that no tenant can access another’s data or systems.
Option A:✅Correct. This is the foundational control —isolation of customer environments.
Option B:❌Incorrect. Exposing system config files is a security risk.
Option C:❌Incorrect. Shared user IDs areexplicitly prohibitedby Requirement 8.2.1.
Option D:❌Incorrect. Customers should only access their own logs.
[Reference:PCI DSS v4.0.1 – Requirement 12.10.3; Scoping Guidance for Service Providers., , , ]
Question 3
Which of the following parties is responsible for completion of the Controls Matrix for the Customized Approach?
Options:
A.
Only a Qualified Security Assessor (QSA).
B.
Either a QSA, AQSA, or PCIP.
C.
Entity being assessed.
D.
Card brands or acquirer.
Answer:
C
Explanation:
UnderAppendix D – Customized Approach, it is clearly stated that theentity is responsiblefor completing theControls Matrixand theTargeted Risk Analysis (TRA). The assessor may assist in completion, but accountability for content lies with the entity.
Option A:Incorrect. QSAs may assist but are not solely responsible.
Option B:Incorrect. This overstates who is responsible; only the entity is ultimately accountable.
Option C:Correct. The entity being assessed is responsible for completing the Controls Matrix and TRA.
Option D:Incorrect. Card brands or acquirers are not involved in document creation.