How can ZTA planning improve the developer experience?
A. Streamlining access provisioning to deployment environments.
B. Require deployments to be grouped into quarterly batches.
C. Use of a third-party tool for continuous integration/continuous deployment (CI/CD) and deployments.
D. Disallowing DevOps teams access to the pipeline or deployments.
ZTA utilizes which of the following to improve the network's security posture?
A. Micro-segmentation and encryption
B. Compliance analytics and network communication
C. Network communication and micro-segmentation
D. Encryption and compliance analytics
ZT project implementation requires prioritization as part of the overall ZT project planning activities. One area to consider is______ Select the best answer.
A. prioritization based on risks
B. prioritization based on budget
C. prioritization based on management support
D. prioritization based on milestones
Which activity of the ZT implementation preparation phase ensures the resiliency of the organization's operations in the event of disruption?
A. Change management process
B. Business continuity and disaster recovery
C. Visibility and analytics
D. Compliance
SDP features, like multi-factor authentication (MFA), mutual transport layer security (mTLS), and device fingerprinting, protect against
A. phishing
B. certificate forgery
C. domain name system (DNS) poisoning
D. code injections
Which approach to ZTA strongly emphasizes proper governance of access privileges and entitlements for specific assets?
A. ZTA using device application sandboxing
B. ZTA using enhanced identity governance
C. ZTA using micro-segmentation
D. ZTA using network infrastructure and SDPs
What is the function of the rule-based security policies configured on the policy decision point (PDP)?
A. Define rules that specify how information can flow
B. Define rules that specify multi-factor authentication (MFA) requirements
C. Define rules that map roles to users
D. Define rules that control the entitlements to assets
How can device impersonation attacks be effectively prevented in a ZTA?
A. Strict access control
B. Micro-segmentation
C. Organizational asset management
D. Single packet authorization (SPA)
What is one of the key purposes of leveraging visibility and analytics capabilities in a ZTA?
A. Automatically granting access to all requested applications and data.
B. Ensuring device compatibility with legacy applications.
C. Enhancing network performance for faster data access.
D. Continually evaluating user behavior against a baseline to identify unusual actions.
When planning for ZT implementation, who will determine valid users, roles, and privileges for accessing data as part of data governance?
A. IT teams
B. Application owners
C. Asset owners
D. Compliance officers