ExamGecko
Question list
Search
Search

Question 279 - 350-701 discussion

Report
Export

An organization wants to secure data in a cloud environment. Its security model requires that all users be authenticated and authorized. Security configuration and posture must be continuously validated before access is granted or maintained to applications and dat a. There is also a need to allow certain application traffic and deny all other traffic by default. Which technology must be used to implement these requirements?

A.

Virtual routing and forwarding

Answers
A.

Virtual routing and forwarding

B.

Microsegmentation

Answers
B.

Microsegmentation

C.

Access control policy

Answers
C.

Access control policy

D.

Virtual LAN

Answers
D.

Virtual LAN

Suggested answer: C

Explanation:

Zero Trust is a security framework requiring all users, whether in or outside the organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data. Zero Trust assumes that there is no traditional network edge; networks can be local, in the cloud, or a combination or hybrid with resources anywhere as well as workers in any location.

The Zero Trust model uses microsegmentation — a security technique that involves dividing perimeters into small zones to maintain separate access to every part of the network — to contain attacks.

asked 10/10/2024
Christoph Reithmayr
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first