How can we use ZT to ensure that only legitimate users can access a SaaS or PaaS? Select the best answer.
A. Implementing micro-segmentation and mutual Transport Layer Security (mTLS)
B. Configuring the security assertion markup language (SAML) service provider only to accept requests from the designated ZT gateway
C. Integrating behavior analysis and geofencing as part of ZT controls
D. Enforcing multi-factor authentication (MFA) and single-sign on (SSO)
What is one benefit of the protect surface in a ZTA for an organization implementing controls?
A. Controls can be implemented at all ingress and egress points of the network and minimize risk.
B. Controls can be implemented at the perimeter of the network and minimize risk.
C. Controls can be moved away from the asset and minimize risk.
D. Controls can be moved closer to the asset and minimize risk.
In a ZTA, the logical combination of both the policy engine (PE) and policy administrator (PA) is called
A. policy decision point (PDP)
B. role-based access O C. policy enforcement point (PEP)
C. data access policy
Which ZT element provides information that providers can use to keep policies dynamically updated?
A. Communication
B. Data sources
C. Identities
D. Resources
Which vital ZTA component enhances network security and simplifies management by creating boundaries between resources in the same network zone?
A. Micro-segmentation
B. Session establishment or termination
C. Decision transmission
D. Authentication request/validation request (AR/VR)
SDP features, like multi-factor authentication (MFA), mutual transport layer security (mTLS), and device fingerprinting, protect against
A. phishing
B. certificate forgery
C. domain name system (DNS) poisoning
D. code injections
Which of the following is a common activity in the scope, priority, and business case steps of ZT planning?
A. Determine the organization's current state
B. Prioritize protect surfaces O C. Develop a target architecture
C. Identify business and service owners
Which approach to ZTA strongly emphasizes proper governance of access privileges and entitlements for specific assets?
A. ZTA using device application sandboxing
B. ZTA using enhanced identity governance
C. ZTA using micro-segmentation
D. ZTA using network infrastructure and SDPs
When preparing to implement ZTA, some changes may be required. Which of the following components should the organization consider as part of their checklist to ensure a successful implementation?
A. Vulnerability scanning, patch management, change management, and problem management
B. Organization's governance, compliance, risk management, and operations
C. Incident management, business continuity planning (BCP), disaster recovery (DR), and training and awareness programs
D. Visibility and analytics integration and services accessed using mobile devices
What measures are needed to detect and stop malicious access attempts in real-time and prevent damage when using ZTA's centralized authentication and policy enforcement?
A. Audit logging and monitoring
B. Dynamic firewall policies
C. Network segregation
D. Dynamic access policies