Zero Trust Flashcards

Security+

1
Q

What is the core principle of Zero Trust?

A

Nothing is inherently trusted; everything must be verified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a common security issue in traditional networks?

A

Once inside the firewall, there are few security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What approach does Zero Trust take towards network security?

A

It is a holistic approach that covers every device, process, and person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name a method used to verify identities in a Zero Trust model.

A

Multi-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the data plane do?

A

Processes frames, packets, and network data, including forwarding and encrypting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the role of the control plane?

A

Manages actions of the data plane and defines policies and rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What elements are included in a control plane?

A

Routing tables, session tables, and NAT tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does adaptive identity consider in Zero Trust?

A

The source and requested resources, along with multiple risk indicators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Policy Enforcement Point (PEP)?

A

The gatekeeper that allows, monitors, and terminates connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who can be subjects in a Zero Trust framework?

A

End users, applications, and non-human entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does Zero Trust enhance network security?

A

By implementing additional layers such as encryption and monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the significance of monitoring in Zero Trust?

A

It helps detect unauthorized access and potential security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Policy Decision Point (PDP)?

A

A process for making an authentication decision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of a Policy Engine?

A

Evaluates access decisions based on policy and other information sources, granting, denying, or revoking access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does a Policy Administrator do?

A

Communicates with the Policy Enforcement Point, generates access tokens or credentials, and instructs the PEP to allow or disallow access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can authentication be strengthened?

A

By making the authentication stronger if needed.

17
Q

What is threat scope reduction?

A

Decreasing the number of possible entry points for threats.

18
Q

What is policy-driven access control?

A

Combining adaptive identity with a predefined set of rules for access control.

19
Q

Why is security more than a one-to-one relationship?

A

Broad categorizations provide a security-related foundation for managing access.

20
Q

What factors are considered in security zones?

A

Trusted vs. untrusted, internal vs. external networks, and specific departments (e.g., Marketing, IT).

21
Q

How can security zones deny access?

A

By restricting traffic from untrusted to trusted zones, for example.

22
Q

What type of traffic is often implicitly trusted?

A

Traffic from Trusted to Internal zones.