ExamGecko
Question list
Search
Search

Related questions











Question 450 - 312-50v12 discussion

Report
Export

Eric, a cloud security engineer, implements a technique for securing the cloud resources used by his organization. This technique assumes by default that a user attempting to access the network is not an authentic entity and verifies every incoming connection before allowing access to the network.

Using this technique, he also imposed conditions such that employees can access only the resources required for their role.

What is the technique employed by Eric to secure cloud resources?

A.
Serverless computing
Answers
A.
Serverless computing
B.
Demilitarized zone
Answers
B.
Demilitarized zone
C.
Container technology
Answers
C.
Container technology
D.
Zero trust network
Answers
D.
Zero trust network
Suggested answer: D

Explanation:

Zero Trust Networks The Zero Trust model is a security implementation that by default assumes every user trying to access the network is not a trusted entity and verifies every incoming connection before allowing access to the network.It strictly follows the principle, "Trust no one and validate before providing a cloud service or granting access permission."It also allows companies to impose conditions, such as allowing employees to only access the appropriate resources required for their work role. (P.2997/2981) Zero Trust is a strategic initiative that helps prevent successful data breaches by eliminating the concept of trust from an organization's network architecture. Rooted in the principle of "never trust, always verify," Zero Trust is designed to protect modern digital environments by leveraging network segmentation, preventing lateral movement, providing Layer 7 threat prevention, and simplifying granular user-access control.

asked 18/09/2024
Maxim Shpakov
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first