Network architects should consider__________ before selecting an SDP  model.

Network architects should consider__________ before selecting an SDP  model.A . leadership buy-inB . gatewaysC . their use caseD . costView AnswerAnswer: C Explanation: Different SDP deployment models have different advantages and disadvantages depending on the organization’s use case, such as the type of resources to be protected, the location of...

January 20, 2024 No Comments READ MORE +

Within the context of risk management, what are the essential components of an organization's ongoing risk analysis?

Within the context of risk management, what are the essential components of an organization's ongoing risk analysis?A . Gap analysis, security policies, and migrationB . Assessment frequency, metrics, and dataC . Log scoping, log sources, and anomaliesD . Incident management, change management, and complianceView AnswerAnswer: B Explanation: The essential components...

January 19, 2024 No Comments READ MORE +

Of the following, which option is a prerequisite action to understand the organization's protect surface clearly?

Of the following, which option is a prerequisite action to understand the organization's protect surface clearly?A . Data and asset classificationB . Threat intelligence capability and monitoringC . Gap analysis of the organization's threat landscapeD . To have the latest risk register for controls implementationView AnswerAnswer: A Explanation: Data and...

January 19, 2024 No Comments READ MORE +

In a ZTA, the logical combination of both the policy engine (PE) and policy administrator (PA) is called

In a ZTA, the logical combination of both the policy engine (PE) and policy administrator (PA) is calledA . policy decision point (PDP)B . role-based accessC . policy enforcement point (PEP)D . data access policyView AnswerAnswer: A Explanation: In a ZTA, the logical combination of both the policy engine (PE)...

January 18, 2024 No Comments READ MORE +

Which ZT tenet is based on the notion that malicious actors reside inside and outside the network?

Which ZT tenet is based on the notion that malicious actors reside inside and outside the network?A . Assume breachB . Assume a hostile environmentC . Scrutinize explicitlyD . Requiring continuous monitoringView AnswerAnswer: A Explanation: The ZT tenet of assume breach is based on the notion that malicious actors reside...

January 16, 2024 No Comments READ MORE +

What is the function of the rule-based security policies configured on the policy decision point (PDP)?

What is the function of the rule-based security policies configured on the policy decision point (PDP)?A . Define rules that specify how information can flowB . Define rules that specify multi-factor authentication (MFA) requirementsC . Define rules that map roles to usersD . Define rules that control the entitlements to...

January 16, 2024 No Comments READ MORE +

What is one of the key purposes of leveraging visibility & analytics capabilities in a ZTA?

What is one of the key purposes of leveraging visibility & analytics capabilities in a ZTA?A . Automatically granting access to all requested applications and data.B . Ensuring device compatibility with legacy applications.C . Enhancing network performance for faster data access.D . Continually evaluating user behavior against a baseline to...

January 15, 2024 No Comments READ MORE +

Which of the following is a common activity in the scope, priority, and business case steps of ZT planning?

Which of the following is a common activity in the scope, priority, and business case steps of ZT planning?A . Determine the organization's current stateB . Prioritize protect surfacesC . Develop a target architectureD . Identify business and service ownersView AnswerAnswer: A Explanation: A common activity in the scope, priority,...

January 15, 2024 No Comments READ MORE +

Which component in a ZTA is responsible for deciding whether to grant access to a resource?

Which component in a ZTA is responsible for deciding whether to grant access to a resource?A . The policy enforcement point (PEP)B . The policy administrator (PA)C . The policy engine (PE)D . The policy componentView AnswerAnswer: C Explanation: The policy engine (PE) is the component in a ZTA that...

January 15, 2024 No Comments READ MORE +

What can be said about ZTA models in terms of access decisions?

ZTA reduces management overhead by applying a consistent access model throughout the environment for all assets. What can be said about ZTA models in terms of access decisions?A . The traffic of the access workflow must contain all the parameters for the policy decision points.B . The traffic of the...

January 14, 2024 No Comments READ MORE +