Certificate of Competence in Zero Trust (CCZT) Questions and Answers
In a ZTA, the logical combination of both the policy engine (PE) and
policy administrator (PA) is called
In SaaS and PaaS, which access control method will ZT help define
for access to the features within a service?
To respond quickly to changes while implementing ZT Strategy, an
organization requires a mindset and culture of
How can device impersonation attacks be effectively prevented in a
ZTA?
Within the context of risk management, what are the essential
components of an organization's ongoing risk analysis?
In a ZTA, what is a key difference between a policy decision point
(PDP) and a policy enforcement point (PEP)?
Which element of ZT focuses on the governance rules that define
the "who, what, when, how, and why" aspects of accessing target
resources?
Scenario: An organization is conducting a gap analysis as a part of
its ZT planning. During which of the following steps will risk
appetite be defined?
When kicking off ZT planning, what is the first step for an
organization in defining priorities?
What is the function of the rule-based security policies configured
on the policy decision point (PDP)?
ZTA reduces management overhead by applying a consistent
access model throughout the environment for all assets. What can
be said about ZTA models in terms of access decisions?
At which layer of the open systems interconnection (OSI) model
does network access control (NAC) typically operate? Select the
best answer.
ZT project implementation requires prioritization as part of the
overall ZT project planning activities. One area to consider is______
Select the best answer.
How can ZTA planning improve the developer experience?
Which approach to ZTA strongly emphasizes proper governance of
access privileges and entitlements for specific assets?
When implementing ZTA, why is it important to collect logs from
different log sources?
Which vital ZTA component enhances network security and
simplifies management by creating boundaries between resources
in the same network zone?
According to NIST, what are the key mechanisms for defining,
managing, and enforcing policies in a ZTA?
Which of the following is a key principle of ZT and is required for its
implementation?
When preparing to implement ZTA, some changes may be required.
Which of the following components should the organization
consider as part of their checklist to ensure a successful
implementation?
During ZT planning, which of the following determines the scope of
the target state definition? Select the best answer.
Scenario: As a ZTA security administrator, you aim to enforce the
principle of least privilege for private cloud network access. Which
ZTA policy entity is mainly responsible for crafting and maintaining
these policies?
How can ZTA planning improve the developer experience?
Which component in a ZTA is responsible for deciding whether to
grant access to a resource?
Within the context of risk management, what are the essential
components of an organization's ongoing risk analysis?
In a ZTA, the logical combination of both the policy engine (PE) and
policy administrator (PA) is called
What is one of the key purposes of leveraging visibility & analytics
capabilities in a ZTA?
Which ZT element provides information that providers can use to
keep policies dynamically updated?
Optimal compliance posture is mainly achieved through two key ZT
features:_____ and_____
How can device impersonation attacks be effectively prevented in a
ZTA?
In a ZTA, automation and orchestration can increase security by
using the following means:
Of the following options, which risk/threat does SDP mitigate by
mandating micro-segmentation and implementing least privilege?
SDP features, like multi-factor authentication (MFA), mutual
transport layer security (mTLS), and device fingerprinting, protect
against
In a continual improvement model, who maintains the ZT policies?
Scenario: A multinational org uses ZTA to enhance security. They
collaborate with third-party service providers for remote access to
specific resources. How can ZTA policies authenticate third-party
users and devices for accessing resources?