Practice Free CCZT Exam Online Questions
What should be a key component of any ZT project, especially during implementation and adjustments?
- A . Extensive task monitoring
- B . Frequent technology changes
- C . Proper risk management
- D . Frequent policy audits
Which of the following is a common activity in the scope, priority, and business case steps of ZT planning?
- A . Determine the organization’s current state
- B . Prioritize protect surfaces
- C . Develop a target architecture
- D . Identify business and service owners
For ZTA, what should be used to validate the identity of an entity?
- A . Password management system
- B . Multifactor authentication
- C . Single sign-on
- D . Bio-metric authentication
When planning for a ZTA, a critical product of the gap analysis process is______
- A . a responsible, accountable, consulted, and informed (RACI) chart and communication plan
- B . supporting data for the project business case
- C . the implementation’s requirements
- D . a report on impacted identity and access management (IAM) infrastructure
During ZT planning, which of the following determines the scope of the target state definition? Select the best answer.
- A . Risk appetite
- B . Risk assessment
- C . Service level agreements
- D . Risk register
To validate the implementation of ZT and ZTA, rigorous testing is essential. This ensures that access controls are functioning correctly and effectively safeguarded against potential threats, while the intended service levels are delivered. Testing of ZT is therefore
- A . creating an agile culture for rapid deployment of ZT
- B . integrated in the overall cybersecurity program
- C . providing evidence of continuous improvement
- D . allowing direct user feedback
Optimal compliance posture is mainly achieved through two key ZT features:_____ and_____
- A . (1) Principle of least privilege (2) Verifying remote access connections
- B . (1) Discovery (2) Mapping access controls and network assets
- C . (1) Authentication (2) Authorization of all networked assets
- D . (1) Never trusting (2) Reducing the attack surface
How can device impersonation attacks be effectively prevented in a ZTA?
- A . Strict access control
- B . Micro-segmentation
- C . Organizational asset management
- D . Single packet authorization (SPA)
