The correct answer is B. False . Zero Trust architecture is specifically designed to avoid giving users broad, lasting network-level access after a connection is approved. Zscaler’s Universal ZTNA guidance states that users connect directly to applications, not the network , which minimizes attack surface and eliminates lateral movement. This means approval is tied to the specific access request and the relevant context at that moment, not to an ongoing entitlement to the underlying network.
The idea of granting network-level access for 30 days is much closer to a legacy VPN model, where a user is placed onto a routable network and may retain broad reachability beyond the immediate business need. Zero Trust does the opposite. It verifies identity and context, evaluates policy, and then enforces a specific control outcome for that request. If the user’s context changes, the policy outcome can also change. That is why Zero Trust is often described as dynamic and per-access , rather than static and persistent. A connection approved by the Zero Trust Exchange does not imply a long-term network privilege; it enables only the necessary application access under current policy conditions.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit