2 Fundamentals of Security: Zero Trust Flashcards

1
Q

demands verification for every device, user, and transaction within the
network, regardless of its origin

A

Zero Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To create a zero trust architecture, we need to use two different planes

A

Control
Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refers to the overarching framework and set of components responsible for defining, managing, and enforcing the policies related to user and system access within an organization

A

Control Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Control Plane typically encompasses several key elements

A

Adaptive Identity
Threat Scope Reduction
Policy Driven Access Control
Secured Zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Relies on real-time validation that takes into account the user’s behavior, device, location, and more

A

Adaptive Identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Limits the users’ access to only what they need for their work tasks because this reduces the network’s potential attack surface

A

Threat Scope Reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Focused on minimizing the “blast radius” that could occur in the event of a breach

A

Threat Scope Reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Entails developing, managing, and enforcing user access policies based on their roles and responsibilities

A

Policy Driven Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Isolated environments within a network that are designed to house sensitive data

A

Secured Zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ensures the policies are properly executed

A

Data plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data plane consists of the following

A

Subject/system
policy engine
policy admin
policy enforcement point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Refers to the individual or entity attempting to gain access

A

Subject/system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

■ Cross-references the access request with its predefined policies

A

Policy Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Used to establish and manage the access policies

A

Policy Admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where the decision to grant or deny access is actually
execute

A

Policy Enforcement Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly