ExamGecko
Question list
Search
Search

Question 49 - PCCET discussion

Report
Export

Which core component is used to implement a Zero Trust architecture?

A.
VPN Concentrator
Answers
A.
VPN Concentrator
B.
Content Identification
Answers
B.
Content Identification
C.
Segmentation Platform
Answers
C.
Segmentation Platform
D.
Web Application Zone
Answers
D.
Web Application Zone
Suggested answer: C

Explanation:

'Remember that a trust zone is not intended to be a ''pocket of trust'' where systems (and therefore threats) within the zone can communicate freely and directly with each other. For a full Zero Trust implementation, the network would be configured to ensure that all communications traffic, including traffic between devices in the same zone, is intermediated by the corresponding Zero Trust Segmentation Platform.'

asked 23/09/2024
Duane Innmon
24 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first