ExamGecko
Question list
Search
Search

Question 142 - PCCET discussion

Report
Export

Which capability of a Zero Trust network security architecture leverages the combination of application, user, and content identification to prevent unauthorized access?

A.
Cyber threat protection
Answers
A.
Cyber threat protection
B.
Inspection of all traffic
Answers
B.
Inspection of all traffic
C.
Least privileges access control
Answers
C.
Least privileges access control
D.
Network segmentation
Answers
D.
Network segmentation
Suggested answer: C

Explanation:

Least privileges access control is the capability of a Zero Trust network security architecture that leverages the combination of application, user, and content identification to prevent unauthorized access. Least privileges access control means that users and devices are only granted the permissions they need to perform their tasks, and nothing more. This helps reduce the attack surface and makes it more difficult for attackers to gain access to sensitive data or resources. Least privileges access control is based on the principle of Zero Trust, which assumes that there are attackers both within and outside of the network, so no users or devices should be automatically trusted. Zero Trust verifies user identity and privileges as well as device identity and security, and requires end-to-end encryption. Least privileges access control also involves careful management of user permissions and network segmentation, which limit the amount of information and length of time people can access something, and contain the damage if someone does get unauthorized access.Reference:What Is Zero Trust Architecture? | Microsoft Security,Zero Trust security | What is a Zero Trust network? | Cloudflare,What is Zero Trust Architecture? | SANS Institute,What Is a Zero Trust Architecture? | Zscaler,What is Zero Trust Architecture (ZTA)? - CrowdStrike.

asked 23/09/2024
Donn Policarpio
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first