Pass the Cloud Security Alliance Zero Trust CCZT Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

When kicking off ZT planning, what is the first step for an

organization in defining priorities?

Options:

A.

Determine current state


B.

Define the scope


C.

Define a business case


D.

Identifying the data and assets


Expert Solution
Questions # 2:

What is the function of the rule-based security policies configured

on the policy decision point (PDP)?

Options:

A.

Define rules that specify how information can flow


B.

Define rules that specify multi-factor authentication (MFA)

requirements


C.

Define rules that map roles to users


D.

Define rules that control the entitlements to assets


Expert Solution
Questions # 3:

In a continual improvement model, who maintains the ZT policies?

Options:

A.

System administrators


B.

ZT administrators


C.

Server administrators


D.

Policy administrators


Expert Solution
Questions # 4:

Scenario: A multinational org uses ZTA to enhance security. They

collaborate with third-party service providers for remote access to

specific resources. How can ZTA policies authenticate third-party

users and devices for accessing resources?

Options:

A.

ZTA policies can implement robust encryption and secure access

controls to prevent access to services from stolen devices, ensuring

that only legitimate users can access mobile services.


B.

ZTA policies should prioritize securing remote users through

technologies like virtual desktop infrastructure (VDI) and corporate

cloud workstation resources to reduce the risk of lateral movement via

compromised access controls.


C.

ZTA policies can be configured to authenticate third-party users

and their devices, determining the necessary access privileges for

resources while concealing all other assets to minimize the attack

surface.


D.

ZTA policies should primarily educate users about secure practices

and promote strong authentication for services accessed via mobile

devices to prevent data compromise.


Expert Solution
Questions # 5:

Of the following, which option is a prerequisite action to understand the organization's protect surface clearly?

Options:

A.

Data and asset classification


B.

Threat intelligence capability and monitoring


C.

Gap analysis of the organization's threat landscape


D.

To have the latest risk register for controls implementation


Expert Solution
Questions # 6:

Which activity of the ZT implementation preparation phase ensures

the resiliency of the organization's operations in the event of

disruption?

Options:

A.

Change management process


B.

Business continuity and disaster recovery


C.

Visibility and analytics


D.

Compliance


Expert Solution
Questions # 7:

In SaaS and PaaS, which access control method will ZT help define

for access to the features within a service?

Options:

A.

Data-based access control (DBAC)


B.

Attribute-based access control (ABAC)


C.

Role-based access control (RBAC)


D.

Privilege-based access control (PBAC)


Expert Solution
Questions # 8:

Which ZT element provides information that providers can use to

keep policies dynamically updated?

Options:

A.

Communication


B.

Data sources


C.

Identities


D.

Resources


Expert Solution
Questions # 9:

To successfully implement ZT security, two crucial processes must

be planned and aligned with existing access procedures that the ZT

implementation might impact. What are these two processes?

Options:

A.

Incident and response management


B.

Training and awareness programs


C.

Vulnerability disclosure and patching management


D.

Business continuity planning (BCP) and disaster recovery (DR)


Expert Solution
Questions # 10:

Network architects should consider__________ before selecting an SDP model.

Select the best answer.

Options:

A.

leadership buy-in


B.

gateways


C.

their use case


D.

cost


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions