CSA - Cloud Security Alliance CCZT Practice Test - Questions Answers, Page 3
List of questions
Question 21
For ZTA, what should be used to validate the identity of an entity?
Question 22
Scenario: An organization is conducting a gap analysis as a part of its ZT planning. During which of the following steps will risk appetite be defined?
Question 23
Which activity of the ZT implementation preparation phase ensures the resiliency of the organization's operations in the event of disruption?
Question 24
Which element of ZT focuses on the governance rules that define the 'who, what, when, how, and why' aspects of accessing target resources?
Question 25
What does device validation help establish in a ZT deployment?
Question 26
Which approach to ZTA strongly emphasizes proper governance of access privileges and entitlements for specific assets?
Question 27
During the monitoring and analytics phase of ZT transaction flowso rganizations should collect statistics and profile the behavior of transactions. What does this support in the ZTA?
Question 28
When planning for a ZTA, a critical product of the gap analysis process is______
Select the best answer.
Question 29
ZT project implementation requires prioritization as part of the overall ZT project planning activities. One area to consider is______
Select the best answer.
Question 30
According to NIST, what are the key mechanisms for definingm anaging, and enforcing policies in a ZTA?
Question