To successfully implement ZT security, two crucial processes must be planned and aligned with existing access procedures that the ZT implementation might impact. What are these two processes?
A. Incident and response management
B. Training and awareness programs
C. Vulnerability disclosure and patching management
D. Business continuity planning (BCP) and disaster recovery (DR)
Which ZT tenet is based on the notion that malicious actors reside inside and outside the network?
A. Assume breach
B. Assume a hostile environment
C. Scrutinize explicitly
D. Requiring continuous monitoring
In SaaS and PaaS, which access control method will ZT help define for access to the features within a service?
A. Data-based access control (DBAC)
B. Attribute-based access control (ABAC)
C. Role-based access control (RBAC)
D. Privilege-based access control (PBAC)
During ZT planning, which of the following determines the scope of the target state definition? Select the best answer.
A. Risk appetite
B. Risk assessment
C. Service level agreements D. Risk register
Which activity of the ZT implementation preparation phase ensures the resiliency of the organization's operations in the event of disruption?
A. Change management process
B. Business continuity and disaster recovery
C. Visibility and analytics
D. Compliance
In a continual improvement model, who maintains the ZT policies?
A. System administrators
B. ZT administrators
C. Server administrators
D. Policy administrators
What does device validation help establish in a ZT deployment?
A. Connection based on user
B. High-speed network connectivity
C. Trusted connection based on certificate-based keys
D. Unrestricted public access
Which of the following is a key principle of ZT and is required for its implementation?
A. Implementing strong anti-phishing email filters
B. Making no assumptions about an entity's trustworthiness when it requests access to a resource
C. Encrypting all communications between any two endpoints
D. Requiring that authentication and explicit authorization must occur after network access has been granted
Scenario: A multinational org uses ZTA to enhance security. They collaborate with third-party service providers for remote access to specific resources. How can ZTA policies authenticate third-party users and devices for accessing resources?
A. ZTA policies can implement robust encryption and secure access controls to prevent access to services from stolen devices, ensuring that only legitimate users can access mobile services.
B. ZTA policies should prioritize securing remote users through technologies like virtual desktop infrastructure (VDI) and corporate cloud workstation resources to reduce the risk of lateral movement via compromised access controls.
C. ZTA policies can be configured to authenticate third-party users and their devices, determining the necessary access privileges for resources while concealing all other assets to minimize the attack surface.
D. ZTA policies should primarily educate users about secure practices and promote strong authentication for services accessed via mobile devices to prevent data compromise.
What measures are needed to detect and stop malicious access attempts in real-time and prevent damage when using ZTA's centralized authentication and policy enforcement?
A. Audit logging and monitoring
B. Dynamic firewall policies
C. Network segregation
D. Dynamic access policies