CSA - Cloud Security Alliance CCZT Practice Test 1
 Add to Whishlist
                                                Add to Whishlist
                                            
                Question 1 / 40
            
            
            
        ZTA utilizes which of the following to improve the network's security posture?
                                                                     Micro-segmentation and encryption
                                                                
                                                            
                                                                     Compliance analytics and network communication
                                                                
                                                            
                                                                     Network communication and micro-segmentation
                                                                
                                                            
                                                                     Encryption and compliance analytics
                                                                
                                                            
                                                    
                                                        Comment (0)
                                                    
                                                    
                                                    
                                                            
                                                    
                                                        
                                                            
                                                                
                                                            
                                                        
                                                    
                                                
                                        Suggested answer: A
                                                                                                                    
                                                                Explanation:
                                                                
                                                            
                                                    Verified Answer =
A) Micro-segmentation and encryption Very Short Explanation = ZTA uses micro-segmentation to divide the network into smaller, isolated segments that can prevent unauthorized access and contain lateral movement. ZTA also uses encryption to protect data in transit and at rest from eavesdropping and tampering. Reference = 1, 2, 3, 4
 
         
            
         
                                         Restart test
 Restart test 
 