Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Cloud Security Alliance CCZT Dumps

Page: 1 / 6
Total 60 questions

Certificate of Competence in Zero Trust (CCZT) Questions and Answers

Question 1

In a ZTA, the logical combination of both the policy engine (PE) and

policy administrator (PA) is called

Options:

A.

policy decision point (PDP)

B.

role-based access

O C. policy enforcement point (PEP)

C.

data access policy

Question 2

In SaaS and PaaS, which access control method will ZT help define

for access to the features within a service?

Options:

A.

Data-based access control (DBAC)

B.

Attribute-based access control (ABAC)

C.

Role-based access control (RBAC)

D.

Privilege-based access control (PBAC)

Question 3

To respond quickly to changes while implementing ZT Strategy, an

organization requires a mindset and culture of

Options:

A.

learning and growth.

B.

continuous risk evaluation and policy adjustment.

C.

continuous process improvement.

D.

project governance.

Question 4

How can device impersonation attacks be effectively prevented in a

ZTA?

Options:

A.

Strict access control

B.

Micro-segmentation

C.

Organizational asset management

D.

Single packet authorization (SPA)

Question 5

Within the context of risk management, what are the essential

components of an organization's ongoing risk analysis?

Options:

A.

Gap analysis, security policies, and migration

B.

Assessment frequency, metrics, and data

C.

Log scoping, log sources, and anomalies

D.

Incident management, change management, and compliance

Question 6

In a ZTA, what is a key difference between a policy decision point

(PDP) and a policy enforcement point (PEP)?

Options:

A.

A PDP measures incoming signals against a set of access

determination criteria. A PEP uses incoming signals to open or close a

connection.

B.

A PDP measures incoming signals and makes dynamic risk

determinations. A PEP uses incoming signals to make static risk

determinations.

C.

A PDP measures incoming control plane authentication signals. A

PEP measures incoming data plane authorization signals.

D.

A PDP measures incoming signals in an untrusted zone. A PEP

measures incoming signals in an implicit trust zone.

Question 7

Which element of ZT focuses on the governance rules that define

the "who, what, when, how, and why" aspects of accessing target

resources?

Options:

A.

Policy

B.

Data sources

C.

Scrutinize explicitly

D.

Never trust, always verify

Question 8

Scenario: An organization is conducting a gap analysis as a part of

its ZT planning. During which of the following steps will risk

appetite be defined?

Options:

A.

Create a roadmap

B.

Determine the target state

C.

Determine the current state

D.

Define requirements

Question 9

When kicking off ZT planning, what is the first step for an

organization in defining priorities?

Options:

A.

Determine current state

B.

Define the scope

C.

Define a business case

D.

Identifying the data and assets

Question 10

What is the function of the rule-based security policies configured

on the policy decision point (PDP)?

Options:

A.

Define rules that specify how information can flow

B.

Define rules that specify multi-factor authentication (MFA)

requirements

C.

Define rules that map roles to users

D.

Define rules that control the entitlements to assets

Question 11

ZTA reduces management overhead by applying a consistent

access model throughout the environment for all assets. What can

be said about ZTA models in terms of access decisions?

Options:

A.

The traffic of the access workflow must contain all the parameters

for the policy decision points.

B.

The traffic of the access workflow must contain all the parameters

for the policy enforcement points.

C.

Each access request is handled just-in-time by the policy decision

points.

D.

Access revocation data will be passed from the policy decision

points to the policy enforcement points.

Question 12

At which layer of the open systems interconnection (OSI) model

does network access control (NAC) typically operate? Select the

best answer.

Options:

A.

Layer 6, the presentation layer

B.

Layer 2, the data link layer

C.

Layer 3, the network layer

D.

Layer 4, the transport layer

Question 13

ZT project implementation requires prioritization as part of the

overall ZT project planning activities. One area to consider is______

Select the best answer.

Options:

A.

prioritization based on risks

B.

prioritization based on budget

C.

prioritization based on management support

D.

prioritization based on milestones

Question 14

How can ZTA planning improve the developer experience?

Options:

A.

Streamlining access provisioning to deployment environments.

B.

Require deployments to be grouped into quarterly batches.

C.

Use of a third-party tool for continuous integration/continuous

deployment (CI/CD) and deployments.

D.

Disallowing DevOps teams access to the pipeline or deployments.

Question 15

Which approach to ZTA strongly emphasizes proper governance of

access privileges and entitlements for specific assets?

Options:

A.

ZTA using device application sandboxing

B.

ZTA using enhanced identity governance

C.

ZTA using micro-segmentation

D.

ZTA using network infrastructure and SDPs

Question 16

When implementing ZTA, why is it important to collect logs from

different log sources?

Options:

A.

Collecting logs supports investigations, dashboard creation, and

policy adjustments.

B.

Collecting logs supports recording transaction flows, mapping

transaction flows, and detecting changes in transaction flows.

C.

Collecting logs supports change management, incident

management, visibility and analytics.

D.

Collecting logs supports micro-segmentation, device security, and

governance.

Question 17

Which vital ZTA component enhances network security and

simplifies management by creating boundaries between resources

in the same network zone?

Options:

A.

Micro-segmentation

B.

Session establishment or termination

C.

Decision transmission

D.

Authentication request/validation request (AR/VR)

Question 18

According to NIST, what are the key mechanisms for defining,

managing, and enforcing policies in a ZTA?

Options:

A.

Policy decision point (PDP), policy enforcement point (PEP), and

policy information point (PIP)

B.

Data access policy, public key infrastructure (PKI), and identity and

access management (IAM)

C.

Control plane, data plane, and application plane

D.

Policy engine (PE), policy administrator (PA), and policy broker (PB)

Question 19

Which of the following is a key principle of ZT and is required for its

implementation?

Options:

A.

Implementing strong anti-phishing email filters

B.

Making no assumptions about an entity's trustworthiness when it

requests access to a resource

C.

Encrypting all communications between any two endpoints

D.

Requiring that authentication and explicit authorization must occur

after network access has been granted

Question 20

When preparing to implement ZTA, some changes may be required.

Which of the following components should the organization

consider as part of their checklist to ensure a successful

implementation?

Options:

A.

Vulnerability scanning, patch management, change management,

and problem management

B.

Organization's governance, compliance, risk management, and

operations

C.

Incident management, business continuity planning (BCP), disaster

recovery (DR), and training and awareness programs

D.

Visibility and analytics integration and services accessed using

mobile devices

Question 21

During ZT planning, which of the following determines the scope of

the target state definition? Select the best answer.

Options:

A.

Risk appetite

B.

Risk assessment

C.

Service level agreements

D.

Risk register

Question 22

Scenario: As a ZTA security administrator, you aim to enforce the

principle of least privilege for private cloud network access. Which

ZTA policy entity is mainly responsible for crafting and maintaining

these policies?

Options:

A.

Gateway enforcing access policies

B.

Policy enforcement point (PEP)

C.

Policy administrator (PA)

D.

Policy decision point (PDP)

Question 23

How can ZTA planning improve the developer experience?

Options:

A.

Streamlining access provisioning to deployment environments.

B.

Require deployments to be grouped into quarterly batches.

C.

Use of a third-party tool for continuous integration/continuous

deployment (CI/CD) and deployments.

D.

Disallowing DevOps teams access to the pipeline or deployments.

Question 24

Which component in a ZTA is responsible for deciding whether to

grant access to a resource?

Options:

A.

The policy enforcement point (PEP)

B.

The policy administrator (PA)

C.

The policy engine (PE)

D.

The policy component

Question 25

Within the context of risk management, what are the essential

components of an organization's ongoing risk analysis?

Options:

A.

Gap analysis, security policies, and migration

B.

Assessment frequency, metrics, and data

C.

Log scoping, log sources, and anomalies

D.

Incident management, change management, and compliance

Question 26

In a ZTA, the logical combination of both the policy engine (PE) and

policy administrator (PA) is called

Options:

A.

policy decision point (PDP)

B.

role-based access

O C. policy enforcement point (PEP)

C.

data access policy

Question 27

What is one of the key purposes of leveraging visibility & analytics

capabilities in a ZTA?

Options:

A.

Automatically granting access to all requested applications and

data.

B.

Ensuring device compatibility with legacy applications.

C.

Enhancing network performance for faster data access.

D.

Continually evaluating user behavior against a baseline to identify

unusual actions.

Question 28

Which ZT element provides information that providers can use to

keep policies dynamically updated?

Options:

A.

Communication

B.

Data sources

C.

Identities

D.

Resources

Question 29

Optimal compliance posture is mainly achieved through two key ZT

features:_____ and_____

Options:

A.

(1) Principle of least privilege (2) Verifying remote access

connections

B.

(1) Discovery (2) Mapping access controls and network assets

C.

(1) Authentication (2) Authorization of all networked assets

D.

(1) Never trusting (2) Reducing the attack surface

Question 30

How can device impersonation attacks be effectively prevented in a

ZTA?

Options:

A.

Strict access control

B.

Micro-segmentation

C.

Organizational asset management

D.

Single packet authorization (SPA)

Question 31

In a ZTA, automation and orchestration can increase security by

using the following means:

Options:

A.

Kubernetes and docker

B.

Static application security testing (SAST) and dynamic application

security testing (DAST)

C.

Data loss prevention (DLP) and cloud security access broker (CASB)

D.

Infrastructure as code (laC) and identity lifecycle management

Question 32

Of the following options, which risk/threat does SDP mitigate by

mandating micro-segmentation and implementing least privilege?

Options:

A.

Identification and authentication failures

B.

Injection

C.

Security logging and monitoring failures

D.

Broken access control

Question 33

SDP features, like multi-factor authentication (MFA), mutual

transport layer security (mTLS), and device fingerprinting, protect

against

Options:

A.

phishing

B.

certificate forgery

C.

domain name system (DNS) poisoning

D.

code injections

Question 34

In a continual improvement model, who maintains the ZT policies?

Options:

A.

System administrators

B.

ZT administrators

C.

Server administrators

D.

Policy administrators

Question 35

Scenario: A multinational org uses ZTA to enhance security. They

collaborate with third-party service providers for remote access to

specific resources. How can ZTA policies authenticate third-party

users and devices for accessing resources?

Options:

A.

ZTA policies can implement robust encryption and secure access

controls to prevent access to services from stolen devices, ensuring

that only legitimate users can access mobile services.

B.

ZTA policies should prioritize securing remote users through

technologies like virtual desktop infrastructure (VDI) and corporate

cloud workstation resources to reduce the risk of lateral movement via

compromised access controls.

C.

ZTA policies can be configured to authenticate third-party users

and their devices, determining the necessary access privileges for

resources while concealing all other assets to minimize the attack

surface.

D.

ZTA policies should primarily educate users about secure practices

and promote strong authentication for services accessed via mobile

devices to prevent data compromise.

Page: 1 / 6
Total 60 questions