CSA - Cloud Security Alliance CCZT Practice Test - Questions Answers, Page 3

List of questions
Question 21

For ZTA, what should be used to validate the identity of an entity?
Question 22

Scenario: An organization is conducting a gap analysis as a part of its ZT planning. During which of the following steps will risk appetite be defined?
Question 23

Which activity of the ZT implementation preparation phase ensures the resiliency of the organization's operations in the event of disruption?
Question 24

Which element of ZT focuses on the governance rules that define the 'who, what, when, how, and why' aspects of accessing target resources?
Question 25

What does device validation help establish in a ZT deployment?
Question 26

Which approach to ZTA strongly emphasizes proper governance of access privileges and entitlements for specific assets?
Question 27

During the monitoring and analytics phase of ZT transaction flowso rganizations should collect statistics and profile the behavior of transactions. What does this support in the ZTA?
Question 28

When planning for a ZTA, a critical product of the gap analysis process is______
Select the best answer.
Question 29

ZT project implementation requires prioritization as part of the overall ZT project planning activities. One area to consider is______
Select the best answer.
Question 30

According to NIST, what are the key mechanisms for definingm anaging, and enforcing policies in a ZTA?
Question