Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Cloud Security Alliance CCZT Dumps Questions Answers

Page: 1 / 5
Total 60 questions

Certificate of Competence in Zero Trust (CCZT) Questions and Answers

Question 1

Optimal compliance posture is mainly achieved through two key ZT

features:_____ and_____

Options:

A.

(1) Principle of least privilege (2) Verifying remote access

connections

B.

(1) Discovery (2) Mapping access controls and network assets

C.

(1) Authentication (2) Authorization of all networked assets

D.

(1) Never trusting (2) Reducing the attack surface

Buy Now
Question 2

When planning for ZT implementation, who will determine valid

users, roles, and privileges for accessing data as part of data

governance?

Options:

A.

IT teams

B.

Application owners

C.

Asset owners

D.

Compliance officers

Question 3

Scenario: As a ZTA security administrator, you aim to enforce the

principle of least privilege for private cloud network access. Which

ZTA policy entity is mainly responsible for crafting and maintaining

these policies?

Options:

A.

Gateway enforcing access policies

B.

Policy enforcement point (PEP)

C.

Policy administrator (PA)

D.

Policy decision point (PDP)

Question 4

Which of the following is a key principle of ZT and is required for its

implementation?

Options:

A.

Implementing strong anti-phishing email filters

B.

Making no assumptions about an entity's trustworthiness when it

requests access to a resource

C.

Encrypting all communications between any two endpoints

D.

Requiring that authentication and explicit authorization must occur

after network access has been granted

Question 5

Which ZT element provides information that providers can use to

keep policies dynamically updated?

Options:

A.

Communication

B.

Data sources

C.

Identities

D.

Resources

Question 6

Which vital ZTA component enhances network security and

simplifies management by creating boundaries between resources

in the same network zone?

Options:

A.

Micro-segmentation

B.

Session establishment or termination

C.

Decision transmission

D.

Authentication request/validation request (AR/VR)

Question 7

Network architects should consider__________ before selecting an SDP model.

Select the best answer.

Options:

A.

leadership buy-in

B.

gateways

C.

their use case

D.

cost

Question 8

What should be a key component of any ZT project, especially

during implementation and adjustments?

Options:

A.

Extensive task monitoring

B.

Frequent technology changes

C.

Proper risk management

D.

Frequent policy audits

Question 9

How can we use ZT to ensure that only legitimate users can access

a SaaS or PaaS? Select the best answer.

Options:

A.

Implementing micro-segmentation and mutual Transport Layer

Security (mTLS)

B.

Configuring the security assertion markup language (SAML) service

provider only to accept requests from the designated ZT gateway

C.

Integrating behavior analysis and geofencing as part of ZT controls

D.

Enforcing multi-factor authentication (MFA) and single-sign on

(SSO)

Question 10

To respond quickly to changes while implementing ZT Strategy, an

organization requires a mindset and culture of

Options:

A.

learning and growth.

B.

continuous risk evaluation and policy adjustment.

C.

continuous process improvement.

D.

project governance.

Question 11

In a ZTA, automation and orchestration can increase security by

using the following means:

Options:

A.

Kubernetes and docker

B.

Static application security testing (SAST) and dynamic application

security testing (DAST)

C.

Data loss prevention (DLP) and cloud security access broker (CASB)

D.

Infrastructure as code (laC) and identity lifecycle management

Question 12

SDP features, like multi-factor authentication (MFA), mutual

transport layer security (mTLS), and device fingerprinting, protect

against

Options:

A.

phishing

B.

certificate forgery

C.

domain name system (DNS) poisoning

D.

code injections

Question 13

To successfully implement ZT security, two crucial processes must

be planned and aligned with existing access procedures that the ZT

implementation might impact. What are these two processes?

Options:

A.

Incident and response management

B.

Training and awareness programs

C.

Vulnerability disclosure and patching management

D.

Business continuity planning (BCP) and disaster recovery (DR)

Question 14

To ensure an acceptable user experience when implementing SDP, a

security architect should collaborate with IT to do what?

Options:

A.

Plan to release SDP as part of a single major change or a "big-bang"

implementation.

B.

Model and plan the user experience, client software distribution,

and device onboarding processes.

C.

Build the business case for SDP, based on cost modeling and

business value.

D.

Advise IT stakeholders that the security team will fully manage all

aspects of the SDP rollout.

Question 15

Scenario: A multinational org uses ZTA to enhance security. They

collaborate with third-party service providers for remote access to

specific resources. How can ZTA policies authenticate third-party

users and devices for accessing resources?

Options:

A.

ZTA policies can implement robust encryption and secure access

controls to prevent access to services from stolen devices, ensuring

that only legitimate users can access mobile services.

B.

ZTA policies should prioritize securing remote users through

technologies like virtual desktop infrastructure (VDI) and corporate

cloud workstation resources to reduce the risk of lateral movement via

compromised access controls.

C.

ZTA policies can be configured to authenticate third-party users

and their devices, determining the necessary access privileges for

resources while concealing all other assets to minimize the attack

surface.

D.

ZTA policies should primarily educate users about secure practices

and promote strong authentication for services accessed via mobile

devices to prevent data compromise.

Question 16

In a ZTA, what is a key difference between a policy decision point

(PDP) and a policy enforcement point (PEP)?

Options:

A.

A PDP measures incoming signals against a set of access

determination criteria. A PEP uses incoming signals to open or close a

connection.

B.

A PDP measures incoming signals and makes dynamic risk

determinations. A PEP uses incoming signals to make static risk

determinations.

C.

A PDP measures incoming control plane authentication signals. A

PEP measures incoming data plane authorization signals.

D.

A PDP measures incoming signals in an untrusted zone. A PEP

measures incoming signals in an implicit trust zone.

Question 17

For ZTA, what should be used to validate the identity of an entity?

Options:

A.

Password management system

B.

Multifactor authentication

C.

Single sign-on

D.

Bio-metric authentication

Question 18

When kicking off ZT planning, what is the first step for an

organization in defining priorities?

Options:

A.

Determine current state

B.

Define the scope

C.

Define a business case

D.

Identifying the data and assets

Page: 1 / 5
Total 60 questions