What is one benefit of the protect surface in a ZTA for an organization implementing controls?
A. Controls can be implemented at all ingress and egress points of the network and minimize risk.
B. Controls can be implemented at the perimeter of the network and minimize risk.
C. Controls can be moved away from the asset and minimize risk.
D. Controls can be moved closer to the asset and minimize risk.
In a ZTA, the logical combination of both the policy engine (PE) and policy administrator (PA) is called
A. policy decision point (PDP)
B. role-based access O C. policy enforcement point (PEP)
C. data access policy
Which ZT element provides information that providers can use to keep policies dynamically updated?
A. Communication
B. Data sources
C. Identities
D. Resources
How can ZTA planning improve the developer experience?
A. Streamlining access provisioning to deployment environments.
B. Require deployments to be grouped into quarterly batches.
C. Use of a third-party tool for continuous integration/continuous deployment (CI/CD) and deployments.
D. Disallowing DevOps teams access to the pipeline or deployments.
ZTA utilizes which of the following to improve the network's security posture?
A. Micro-segmentation and encryption
B. Compliance analytics and network communication
C. Network communication and micro-segmentation
D. Encryption and compliance analytics
Which of the following is a common activity in the scope, priority, and business case steps of ZT planning?
A. Determine the organization's current state
B. Prioritize protect surfaces O C. Develop a target architecture
C. Identify business and service owners
In a ZTA, automation and orchestration can increase security by using the following means:
A. Kubernetes and docker
B. Static application security testing (SAST) and dynamic application security testing (DAST)
C. Data loss prevention (DLP) and cloud security access broker (CASB)
D. Infrastructure as code (laC) and identity lifecycle management
According to NIST, what are the key mechanisms for defining, managing, and enforcing policies in a ZTA?
A. Policy decision point (PDP), policy enforcement point (PEP), and policy information point (PIP)
B. Data access policy, public key infrastructure (PKI), and identity and access management (IAM)
C. Control plane, data plane, and application plane
D. Policy engine (PE), policy administrator (PA), and policy broker (PB)
Which of the following is a required concept of single packet authorizations (SPAs)?
A. An SPA packet must be digitally signed and authenticated.
B. An SPA packet must self-contain all necessary information.
C. An SPA header is encrypted and thus trustworthy.
D. Upon receiving an SPA, a server must respond to establish secure connectivity.
To ensure a successful ZT effort, it is important to
A. engage finance regularly so they understand the effort and do not cancel the project
B. keep the effort focused within IT to avoid any distractions
C. engage stakeholders across the organization and at all levels, including functional areas
D. minimize communication with the business units to avoid "scope creep"