Pass the Cloud Security Alliance Zero Trust CCZT Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

The following list describes the SDP onboarding process/procedure.

What is the third step? 1. SDP controllers are brought online first. 2.

Accepting hosts are enlisted as SDP gateways that connect to and

authenticate with the SDP controller. 3.

Options:

A.

Initiating hosts are then onboarded and authenticated by the SDP

gateway


B.

Clients on the initiating hosts are then onboarded and

authenticated by the SDP controller


C.

SDP gateway is brought online


D.

Finally, SDP controllers are then brought online


Expert Solution
Questions # 12:

What does device validation help establish in a ZT deployment?

Options:

A.

Connection based on user


B.

High-speed network connectivity


C.

Trusted connection based on certificate-based keys


D.

Unrestricted public access


Expert Solution
Questions # 13:

Which of the following is a required concept of single packet

authorizations (SPAs)?

Options:

A.

An SPA packet must be digitally signed and authenticated.


B.

An SPA packet must self-contain all necessary information.


C.

An SPA header is encrypted and thus trustworthy.


D.

Upon receiving an SPA, a server must respond to establish secure

connectivity.


Expert Solution
Questions # 14:

To ensure a successful ZT effort, it is important to

Options:

A.

engage finance regularly so they understand the effort and do not

cancel the project


B.

keep the effort focused within IT to avoid any distractions


C.

engage stakeholders across the organization and at all levels,

including functional areas


D.

minimize communication with the business units to avoid "scope

creep"


Expert Solution
Questions # 15:

What should be a key component of any ZT project, especially

during implementation and adjustments?

Options:

A.

Extensive task monitoring


B.

Frequent technology changes


C.

Proper risk management


D.

Frequent policy audits


Expert Solution
Questions # 16:

Which component in a ZTA is responsible for deciding whether to

grant access to a resource?

Options:

A.

The policy enforcement point (PEP)


B.

The policy administrator (PA)


C.

The policy engine (PE)


D.

The policy component


Expert Solution
Questions # 17:

In a ZTA, where should policies be created?

Options:

A.

Data plane


B.

Network


C.

Control plane


D.

Endpoint


Expert Solution
Questions # 18:

During ZT planning, which of the following determines the scope of

the target state definition? Select the best answer.

Options:

A.

Risk appetite


B.

Risk assessment


C.

Service level agreements


D.

Risk register


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions