Cloud Security Alliance (CSA) CCZT Certificate of Competence in Zero Trust (CCZT) Online Training
Cloud Security Alliance (CSA) CCZT Online Training
The questions for CCZT were last updated at Nov 19,2024.
- Exam Code: CCZT
- Exam Name: Certificate of Competence in Zero Trust (CCZT)
- Certification Provider: Cloud Security Alliance (CSA)
- Latest update: Nov 19,2024
ZTA utilizes which of the following to improve the network’s security posture?
- A . Micro-segmentation and encryption
- B . Compliance analytics and network communication
- C . Network communication and micro-segmentation
- D . Encryption and compliance analytics
Scenario: A multinational org uses ZTA to enhance security. They collaborate with third-party service providers for remote access to specific resources.
How can ZTA policies authenticate third-party users and devices for accessing resources?
- A . ZTA policies can implement robust encryption and secure access controls to prevent access to services from stolen devices, ensuring that only legitimate users can access mobile services.
- B . ZTA policies should prioritize securing remote users through technologies like virtual desktop infrastructure (VDI) and corporate cloud workstation resources to reduce the risk of lateral movement via compromised access controls.
- C . ZTA policies can be configured to authenticate third-party users and their devices, determining the necessary access privileges for resources while concealing all other assets to minimize the attack
surface. - D . ZTA policies should primarily educate users about secure practices and promote strong authentication for services accessed via mobile devices to prevent data compromise.
Which ZT tenet is based on the notion that malicious actors reside inside and outside the network?
- A . Assume breach
- B . Assume a hostile environment
- C . Scrutinize explicitly
- D . Requiring continuous monitoring
During ZT planning, which of the following determines the scope of the target state definition? Select the best answer.
- A . Risk appetite
- B . Risk assessment
- C . Service level agreements
- D . Risk register
Of the following options, which risk/threat does SDP mitigate by mandating micro-segmentation and implementing least privilege?
- A . Identification and authentication failures
- B . Injection
- C . Security logging and monitoring failures
- D . Broken access control
What should an organization’s data and asset classification be based on?
- A . Location of data
- B . History of data
- C . Sensitivity of data
- D . Recovery of data
Which security tools or capabilities can be utilized to automate the response to security events and incidents?
- A . Single packet authorization (SPA)
- B . Security orchestration, automation, and response (SOAR)
- C . Multi-factor authentication (MFA)
- D . Security information and event management (SIEM)
Network architects should consider__________ before selecting an SDP model.
- A . leadership buy-in
- B . gateways
- C . their use case
- D . cost
Which component in a ZTA is responsible for deciding whether to grant access to a resource?
- A . The policy enforcement point (PEP)
- B . The policy administrator (PA)
- C . The policy engine (PE)
- D . The policy component
What is the function of the rule-based security policies configured on the policy decision point (PDP)?
- A . Define rules that specify how information can flow
- B . Define rules that specify multi-factor authentication (MFA) requirements
- C . Define rules that map roles to users
- D . Define rules that control the entitlements to assets