Examining Zero Trust Architecture Flashcards

1
Q

What is Zero Trust Architecture?

A

A security model that requires strict identity verification for every person and device trying to access resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the term ‘North-to-south’ refer to in traditional security?

A

Traditional perimeter-based security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does ‘East-to-west’ traffic require in a Zero Trust model?

A

Authentication beyond the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What principle is Zero Trust Architecture based on?

A

‘Never Trust, Always Verify’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the fundamentals of Zero Trust?

A

Dynamic security, network segmentation, continuous monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does Zero Trust differ from traditional security?

A

ZTA is a dynamic model versus a static security model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example of network segmentation?

A

Segmenting a corporate network into HR, finance, and operations, each with separate access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Continuous Monitoring in Zero Trust?

A

A system that continuously checks a user’s behavior against their profile, flagging anomalies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Policy-Based Authentication?

A

Modern identity verification using multifactor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is dynamic authentication?

A

Access permissions change based on location, time, or device security status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Adaptive risk assessment?

A

A user’s risk level is assessed based on unusual download patterns or access requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Role-Based Access Control (RBAC)?

A

Authorization based on an employee’s role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Attribute-Based Access Control (ABAC)?

A

Access based on attributes like location or time of day.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is real-time authorization?

A

Revoking user access to sensitive data the moment their role changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Continuous Re-validation involve?

A

Periodic checks prompting a user to re-authenticate at random intervals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Principle of Least Privilege?

A

Employees are given access only to the resources necessary for their job.

17
Q

What are Just-In-Time and Just-Enough-Access?

A

Temporary access grants to a system for maintenance, restricting access to only what is needed.

18
Q

How does least privilege mitigate risks?

A

Prevents malware infection from spreading beyond its entry point.

19
Q

What are some transition challenges to Zero Trust Architecture?

A

Legacy systems compatibility issues.

20
Q

What is a recommended best practice for transitioning to ZTA?

A

Start with a small, critical area of the network and gradually expand TA principles.