Zero Trust 1.2 Flashcards

1
Q

[…] is the approach to security where someone must authenticate each time they want to gain access to a particular resource

A

Zero Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Zero trust is implemented by using a combination of […]

A
  • Multifactor Authentication
  • Encryption
  • Firewalls
  • Monitoring / Analytics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

[…] separates the network into different functional planes and applies to physical, virtual, and cloud components

A

Planes of Operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The […] Plane is the part of the device that performs the actual security process. Anything that moves data from one part of the network to another.

A

Data Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The […] Plane manages the actions of the Data Plane
- Defines policies / rules
- Determines how packets should be forwarded

Ex: Routing Tables, Firewall Rules

A

Control Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

[…] determines what level of authentication is needed for an individual based on the risk of a breach and makes it stronger if needed. Risk indicators include:
- Relationship to Org
- Physical Location
- IP Address

A

Adaptive Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

[…] limits how many places can be used to gain access to the network

A

Threat Scope Reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

[…] combines the Adaptive Identity with a predefined set of rules. Determines what type of authentication process will be used to determine if the person trying to gain access is really who they say they are

A

Policy Driven Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

[…] look at where you are connecting from and where you are trying to connect to and allows you to define rules to determine access
- Untrusted zone to a trusted zone (DENY)
- Trusted zone to Internal zone (ALLOW)

A

Security Zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

All traffic must pass through the […] so that you can determine if traffic should be allowed or denied

A

Policy Enforcement Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Policy Enforcement Point does not provide the decision on whether traffic should be allowed or disallowed, but gathers all of the information about the traffic and gives it to the […], which is responsible for the decision

A

Policy Decision Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The […], which is part of the Policy Decision Point, evaluates each request coming in and decides based on policy if it grants, denies, or revokes access.

A

Policy Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The […] communicates with the Policy Enforcement Point the decision of the Policy Engine and tells it to either allow or disallow access. Also generates access tokens or credentials to give to the Policy Enforcement Point.

A

Policy Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The subject is part of the […] Plane

A

Data Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The System is part of the […] Plane

A

Data Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Policy Enforcement Point is part of the […] Plane

A

Data Plane

17
Q

The Policy Decision Point is part of the […] Plane

A

Control Plane

18
Q

The Policy Engine is part of the […] Plane

A

Control Plane

19
Q

The Policy Administrator is part of the […] Plane

A

Control Plane