Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CCZT Exam Dumps - Certificate of Competence in Zero Trust (CCZT)

Go to page:
Question # 9

What measures are needed to detect and stop malicious access

attempts in real-time and prevent damage when using ZTA's

centralized authentication and policy enforcement?

A.

Audit logging and monitoring

B.

Dynamic firewall policies

C.

Network segregation

D.

Dynamic access policies

Full Access
Question # 10

What should an organization's data and asset classification be based on?

A.

Location of data

B.

History of data

C.

Sensitivity of data

D.

Recovery of data

Full Access
Question # 11

Of the following, which option is a prerequisite action to understand the organization's protect surface clearly?

A.

Data and asset classification

B.

Threat intelligence capability and monitoring

C.

Gap analysis of the organization's threat landscape

D.

To have the latest risk register for controls implementation

Full Access
Question # 12

During the monitoring and analytics phase of ZT transaction flows,

organizations should collect statistics and profile the behavior of

transactions. What does this support in the ZTA?

A.

Creating firewall policies to protect data in motion

B.

A continuous assessment of all transactions

C.

Feeding transaction logs into a log monitoring engine

D.

The monitoring of relevant data in critical areas

Full Access
Question # 13

Network architects should consider__________ before selecting an SDP model.

Select the best answer.

A.

leadership buy-in

B.

gateways

C.

their use case

D.

cost

Full Access
Question # 14

When planning for a ZTA, a critical product of the gap analysis

process is______

Select the best answer.

A.

a responsible, accountable, consulted, and informed (RACI) chart

and communication plan

B.

supporting data for the project business case

C.

the implementation's requirements

D.

a report on impacted identity and access management (IAM)

infrastructure

Full Access
Question # 15

Which architectural consideration needs to be taken into account

while deploying SDP? Select the best answer.

A.

How SDP deployment fits into existing network topologies and

technologies.

B.

How SDP deployment fits into external vendor assessment.

C.

How SDP deployment fits into existing human resource

management systems.

D.

How SDP deployment fits into application validation.

Full Access
Question # 16

According to NIST, what are the key mechanisms for defining,

managing, and enforcing policies in a ZTA?

A.

Policy decision point (PDP), policy enforcement point (PEP), and

policy information point (PIP)

B.

Data access policy, public key infrastructure (PKI), and identity and

access management (IAM)

C.

Control plane, data plane, and application plane

D.

Policy engine (PE), policy administrator (PA), and policy broker (PB)

Full Access
Go to page: