Uploaded by kenethdrong

Certificate of Competence in Zero Trust (CCZT) Practice Exam

advertisement
Certificate of
Competence in
Zero Trust (CCZT)
Exam Dumps
https://www.certspots.com/exam/cczt/
Cloud Security Alliance CCZT Exam Dumps
1. When preparing to implement ZTA, some changes may be required.
Which of the following components should the organization consider as part of
their checklist to ensure a successful implementation?
A.Vulnerability scanning, patch management, change management, and problem
management
B.Organization's governance, compliance, risk management, and operations
C.Incident management, business continuity planning (BCP), disaster recovery
(DR), and training and awareness programs
D.Visibility and analytics integration and services accessed using mobile devices
Answer: B
Cloud Security Alliance CCZT Exam Dumps
2. How can ZTA planning improve the developer experience?
A.Streamlining access provisioning to deployment environments.
B.Require deployments to be grouped into quarterly batches.
C.Use of a third-party tool for continuous integration/continuous
deployment (CI/CD) and deployments.
D.Disallowing DevOps teams access to the pipeline or deployments.
Answer: A
Cloud Security Alliance CCZT Exam Dumps
3. According to NIST, what are the key mechanisms for defining,
managing, and enforcing policies in a ZTA?
A.Policy decision point (PDP), policy enforcement point (PEP), and policy
information point (PIP)
B.Data access policy, public key infrastructure (PKI), and identity and
access management (IAM)
C.Control plane, data plane, and application plane
D.Policy engine (PE), policy administrator (PA), and policy broker (PB)
Answer: A
Cloud Security Alliance CCZT Exam Dumps
4. Which of the following is a required concept of single packet
authorizations (SPAs)?
A.An SPA packet must be digitally signed and authenticated.
B.An SPA packet must self-contain all necessary information.
C.An SPA header is encrypted and thus trustworthy.
D.Upon receiving an SPA, a server must respond to establish secure
connectivity.
Answer: A
Cloud Security Alliance CCZT Exam Dumps
5. What is the function of the rule-based security policies configured on
the policy decision point (PDP)?
A.Define rules that specify how information can flow
B.Define rules that specify multi-factor authentication (MFA)
requirements
C.Define rules that map roles to users
D.Define rules that control the entitlements to assets
Answer: D
Cloud Security Alliance CCZT Exam Dumps
6. During the monitoring and analytics phase of ZT transaction flows,
organizations should collect statistics and profile the behavior of
transactions. What does this support in the ZTA?
A.Creating firewall policies to protect data in motion
B.A continuous assessment of all transactions
C.Feeding transaction logs into a log monitoring engine
D.The monitoring of relevant data in critical areas
Answer: B
Cloud Security Alliance CCZT Exam Dumps
7. When planning for a ZTA, a critical product of the gap analysis process
is______
A.a responsible, accountable, consulted, and informed (RACI) chart and
communication plan
B.supporting data for the project business case
C.the implementation's requirements
D.a report on impacted identity and access management (IAM)
infrastructure
Answer: C
Cloud Security Alliance CCZT Exam Dumps
8. Which approach to ZTA strongly emphasizes proper governance of
access privileges and entitlements for specific assets?
A. ZTA using device application sandboxing
B. ZTA using enhanced identity governance
C. ZTA using micro-segmentation
D. ZTA using network infrastructure and SDPs
Answer: B
Cloud Security Alliance CCZT Exam Dumps
9. What does device validation help establish in a ZT deployment?
A. Connection based on user
B. High-speed network connectivity
C. Trusted connection based on certificate-based keys
D. Unrestricted public access
Answer: C
Cloud Security Alliance CCZT Exam Dumps
10. Within the context of risk management, what are the essential
components of an organization's ongoing risk analysis?
A.Gap analysis, security policies, and migration
B.Assessment frequency, metrics, and data
C.Log scoping, log sources, and anomalies
D.Incident management, change management, and compliance
Answer: B
Download