For all instances where cardholder data is transmitted or received over open, public networks:
i. Describe the mechanisms used to ensure that only trusted keys and/or certificates are accepted.
ii. Describe how the mechanisms were observed to accept only trusted keys and/or certificates.