Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cloud Security Alliance CCZT - Certificate of Competence in Zero Trust (CCZT)

Page: 1 / 2
Total 60 questions

Of the following, which option is a prerequisite action to understand the organization's protect surface clearly?

A.

Data and asset classification

B.

Threat intelligence capability and monitoring

C.

Gap analysis of the organization's threat landscape

D.

To have the latest risk register for controls implementation

When implementing ZTA, why is it important to collect logs from

different log sources?

A.

Collecting logs supports investigations, dashboard creation, and

policy adjustments.

B.

Collecting logs supports recording transaction flows, mapping

transaction flows, and detecting changes in transaction flows.

C.

Collecting logs supports change management, incident

management, visibility and analytics.

D.

Collecting logs supports micro-segmentation, device security, and

governance.

What is the function of the rule-based security policies configured

on the policy decision point (PDP)?

A.

Define rules that specify how information can flow

B.

Define rules that specify multi-factor authentication (MFA)

requirements

C.

Define rules that map roles to users

D.

Define rules that control the entitlements to assets

In SaaS and PaaS, which access control method will ZT help define

for access to the features within a service?

A.

Data-based access control (DBAC)

B.

Attribute-based access control (ABAC)

C.

Role-based access control (RBAC)

D.

Privilege-based access control (PBAC)

In a ZTA, what is a key difference between a policy decision point

(PDP) and a policy enforcement point (PEP)?

A.

A PDP measures incoming signals against a set of access

determination criteria. A PEP uses incoming signals to open or close a

connection.

B.

A PDP measures incoming signals and makes dynamic risk

determinations. A PEP uses incoming signals to make static risk

determinations.

C.

A PDP measures incoming control plane authentication signals. A

PEP measures incoming data plane authorization signals.

D.

A PDP measures incoming signals in an untrusted zone. A PEP

measures incoming signals in an implicit trust zone.

Which ZT tenet is based on the notion that malicious actors reside

inside and outside the network?

A.

Assume breach

B.

Assume a hostile environment

C.

Scrutinize explicitly

D.

Requiring continuous monitoring

When planning for a ZTA, a critical product of the gap analysis

process is______

Select the best answer.

A.

a responsible, accountable, consulted, and informed (RACI) chart

and communication plan

B.

supporting data for the project business case

C.

the implementation's requirements

D.

a report on impacted identity and access management (IAM)

infrastructure

ZTA reduces management overhead by applying a consistent

access model throughout the environment for all assets. What can

be said about ZTA models in terms of access decisions?

A.

The traffic of the access workflow must contain all the parameters

for the policy decision points.

B.

The traffic of the access workflow must contain all the parameters

for the policy enforcement points.

C.

Each access request is handled just-in-time by the policy decision

points.

D.

Access revocation data will be passed from the policy decision

points to the policy enforcement points.

To respond quickly to changes while implementing ZT Strategy, an

organization requires a mindset and culture of

A.

learning and growth.

B.

continuous risk evaluation and policy adjustment.

C.

continuous process improvement.

D.

project governance.

ZTA utilizes which of the following to improve the network's security posture?

A.

Micro-segmentation and encryption

B.

Compliance analytics and network communication

C.

Network communication and micro-segmentation

D.

Encryption and compliance analytics