Weekend Sale Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Zero Trust Changed CCZT Questions

Page: 4 / 5
Total 60 questions

Certificate of Competence in Zero Trust (CCZT) Questions and Answers

Question 13

To successfully implement ZT security, two crucial processes must

be planned and aligned with existing access procedures that the ZT

implementation might impact. What are these two processes?

Options:

A.

Incident and response management

B.

Training and awareness programs

C.

Vulnerability disclosure and patching management

D.

Business continuity planning (BCP) and disaster recovery (DR)

Question 14

To ensure an acceptable user experience when implementing SDP, a

security architect should collaborate with IT to do what?

Options:

A.

Plan to release SDP as part of a single major change or a "big-bang"

implementation.

B.

Model and plan the user experience, client software distribution,

and device onboarding processes.

C.

Build the business case for SDP, based on cost modeling and

business value.

D.

Advise IT stakeholders that the security team will fully manage all

aspects of the SDP rollout.

Question 15

Scenario: A multinational org uses ZTA to enhance security. They

collaborate with third-party service providers for remote access to

specific resources. How can ZTA policies authenticate third-party

users and devices for accessing resources?

Options:

A.

ZTA policies can implement robust encryption and secure access

controls to prevent access to services from stolen devices, ensuring

that only legitimate users can access mobile services.

B.

ZTA policies should prioritize securing remote users through

technologies like virtual desktop infrastructure (VDI) and corporate

cloud workstation resources to reduce the risk of lateral movement via

compromised access controls.

C.

ZTA policies can be configured to authenticate third-party users

and their devices, determining the necessary access privileges for

resources while concealing all other assets to minimize the attack

surface.

D.

ZTA policies should primarily educate users about secure practices

and promote strong authentication for services accessed via mobile

devices to prevent data compromise.

Question 16

In a ZTA, what is a key difference between a policy decision point

(PDP) and a policy enforcement point (PEP)?

Options:

A.

A PDP measures incoming signals against a set of access

determination criteria. A PEP uses incoming signals to open or close a

connection.

B.

A PDP measures incoming signals and makes dynamic risk

determinations. A PEP uses incoming signals to make static risk

determinations.

C.

A PDP measures incoming control plane authentication signals. A

PEP measures incoming data plane authorization signals.

D.

A PDP measures incoming signals in an untrusted zone. A PEP

measures incoming signals in an implicit trust zone.

Page: 4 / 5
Total 60 questions