Cloud Security Alliance (CSA) CCZT Certificate of Competence in Zero Trust (CCZT) Online Training
Cloud Security Alliance (CSA) CCZT Online Training
The questions for CCZT were last updated at Nov 19,2024.
- Exam Code: CCZT
- Exam Name: Certificate of Competence in Zero Trust (CCZT)
- Certification Provider: Cloud Security Alliance (CSA)
- Latest update: Nov 19,2024
To respond quickly to changes while implementing ZT Strategy, an organization requires a mindset and culture of
- A . learning and growth.
- B . continuous risk evaluation and policy adjustment.
- C . continuous process improvement.
- D . project governance.
What is one of the key purposes of leveraging visibility & analytics capabilities in a ZTA?
- A . Automatically granting access to all requested applications and data.
- B . Ensuring device compatibility with legacy applications.
- C . Enhancing network performance for faster data access.
- D . Continually evaluating user behavior against a baseline to identify unusual actions.
The following list describes the SDP onboarding process/procedure.
What is the third step? 1. SDP controllers are brought online first. 2. Accepting hosts are enlisted as SDP gateways that connect to and authenticate with the SDP controller. 3.
- A . Initiating hosts are then onboarded and authenticated by the SDP gateway
- B . Clients on the initiating hosts are then onboarded and
authenticated by the SDP controller - C . SDP gateway is brought online
- D . Finally, SDP controllers are then brought online
Which of the following is a common activity in the scope, priority, and business case steps of ZT planning?
- A . Determine the organization’s current state
- B . Prioritize protect surfaces
- C . Develop a target architecture
- D . Identify business and service owners
Within the context of risk management, what are the essential components of an organization’s ongoing risk analysis?
- A . Gap analysis, security policies, and migration
- B . Assessment frequency, metrics, and data
- C . Log scoping, log sources, and anomalies
- D . Incident management, change management, and compliance
ZTA reduces management overhead by applying a consistent access model throughout the environment for all assets.
What can be said about ZTA models in terms of access decisions?
- A . The traffic of the access workflow must contain all the parameters for the policy decision points.
- B . The traffic of the access workflow must contain all the parameters for the policy enforcement points.
- C . Each access request is handled just-in-time by the policy decision points.
- D . Access revocation data will be passed from the policy decision points to the policy enforcement points.
To successfully implement ZT security, two crucial processes must be planned and aligned with existing access procedures that the ZT implementation might impact.
What are these two processes?
- A . Incident and response management
- B . Training and awareness programs
- C . Vulnerability disclosure and patching management
- D . Business continuity planning (BCP) and disaster recovery (DR)
In a ZTA, the logical combination of both the policy engine (PE) and policy administrator (PA) is called
- A . policy decision point (PDP)
- B . role-based access
- C . policy enforcement point (PEP)
- D . data access policy
To ensure a successful ZT effort, it is important to
- A . engage finance regularly so they understand the effort and do not cancel the project
- B . keep the effort focused within IT to avoid any distractions
- C . engage stakeholders across the organization and at all levels, including functional areas
- D . minimize communication with the business units to avoid "scope creep"
Of the following, which option is a prerequisite action to understand the organization’s protect surface clearly?
- A . Data and asset classification
- B . Threat intelligence capability and monitoring
- C . Gap analysis of the organization’s threat landscape
- D . To have the latest risk register for controls implementation