Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cloud Security Alliance CCZT - Certificate of Competence in Zero Trust (CCZT)

Page: 2 / 2
Total 60 questions

During ZT planning, which of the following determines the scope of

the target state definition? Select the best answer.

A.

Risk appetite

B.

Risk assessment

C.

Service level agreements

D.

Risk register

To ensure a successful ZT effort, it is important to

A.

engage finance regularly so they understand the effort and do not

cancel the project

B.

keep the effort focused within IT to avoid any distractions

C.

engage stakeholders across the organization and at all levels,

including functional areas

D.

minimize communication with the business units to avoid "scope

creep"

To ensure an acceptable user experience when implementing SDP, a

security architect should collaborate with IT to do what?

A.

Plan to release SDP as part of a single major change or a "big-bang"

implementation.

B.

Model and plan the user experience, client software distribution,

and device onboarding processes.

C.

Build the business case for SDP, based on cost modeling and

business value.

D.

Advise IT stakeholders that the security team will fully manage all

aspects of the SDP rollout.

Scenario: A multinational org uses ZTA to enhance security. They

collaborate with third-party service providers for remote access to

specific resources. How can ZTA policies authenticate third-party

users and devices for accessing resources?

A.

ZTA policies can implement robust encryption and secure access

controls to prevent access to services from stolen devices, ensuring

that only legitimate users can access mobile services.

B.

ZTA policies should prioritize securing remote users through

technologies like virtual desktop infrastructure (VDI) and corporate

cloud workstation resources to reduce the risk of lateral movement via

compromised access controls.

C.

ZTA policies can be configured to authenticate third-party users

and their devices, determining the necessary access privileges for

resources while concealing all other assets to minimize the attack

surface.

D.

ZTA policies should primarily educate users about secure practices

and promote strong authentication for services accessed via mobile

devices to prevent data compromise.

SDP incorporates single-packet authorization (SPA). After

successful authentication and authorization, what does the client

usually do next? Select the best answer.

A.

Generates an SPA packet and sends it to the initiating host.

B.

Generates an SPA packet and sends it to the controller.

C.

Generates an SPA packet and sends it to the accepting host.

D.

Generates an SPA packet and sends it to the gateway.

Which ZT element provides information that providers can use to

keep policies dynamically updated?

A.

Communication

B.

Data sources

C.

Identities

D.

Resources

SDP features, like multi-factor authentication (MFA), mutual

transport layer security (mTLS), and device fingerprinting, protect

against

A.

phishing

B.

certificate forgery

C.

domain name system (DNS) poisoning

D.

code injections

In a ZTA, automation and orchestration can increase security by

using the following means:

A.

Kubernetes and docker

B.

Static application security testing (SAST) and dynamic application

security testing (DAST)

C.

Data loss prevention (DLP) and cloud security access broker (CASB)

D.

Infrastructure as code (laC) and identity lifecycle management