ExamGecko
Question list
Search
Search

Question 157 - HPE2-W07 discussion

Report
Export

How does Zero Trust Security differ from outdated security practices?

A.
Zero Trust Security relies on user input because network administrators can no longer be trusted completely
Answers
A.
Zero Trust Security relies on user input because network administrators can no longer be trusted completely
B.
Zero Trust Security assumes every user needs basic network access instead of starting with a default deny posture.
Answers
B.
Zero Trust Security assumes every user needs basic network access instead of starting with a default deny posture.
C.
Zero Trust Security focuses on protecting the network perimeter and does not rely on user roles.
Answers
C.
Zero Trust Security focuses on protecting the network perimeter and does not rely on user roles.
D.
Zero Trust Security focuses on protecting resources as opposed to network segments.
Answers
D.
Zero Trust Security focuses on protecting resources as opposed to network segments.
Suggested answer: D

Explanation:

Zero Trust Security differs from outdated security practices by focusing on protecting resources as opposed to network segments. Zero Trust Security assumes that no user, device, or application can be trusted by default and requires continuous verification of identity and context before granting access to resources2. Outdated security practices rely on perimeter-based defenses that assume everything inside the network is safe and everything outside is unsafe3.

asked 16/09/2024
Max Archer
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first