Which three statements accurately describe the guiding principles of Zero Trust? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
A.
Define the perimeter by physical locations.
B.
Use identity as the primary security boundary.
C.
Always verify the permissions of a user explicitly.
D.
Always assume that the user system can be breached.
E.
Use the network as the primary security boundary.
Correct, Zero Trust is a security a strategy. It is not a product or a service, but an approach in designing and implementing the following set of security principles:
Verify explicitly
Use least privilege access
Assume breach
C and D are Zero Trust principles, while B can also be explained by having the least possible privileges for an user (identity), thus being the primary security boundary.
B. Use identity as the primary security boundary. Most Voted
C. Always verify the permissions of a user explicitly. Most Voted
D. Always assume that the user system can be breached.
B. Use identity as the primary security boundary. Most Voted
C. Always verify the permissions of a user explicitly. Most Voted
D. Always assume that the user system can be breached.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
indecisivez
Highly Voted 2 years, 5 months agoClouddog
Highly Voted 2 years, 5 months agoClouddog
2 years, 5 months agoDK21Dilip
Most Recent 2 months agoMaqsoof
5 months, 4 weeks agoFrancielle
8 months, 3 weeks agoCrucius
1 year, 1 month agoMolota
1 year, 4 months agoismalo
1 year, 8 months agowalkaway
1 year, 9 months agomikcs
1 year, 9 months agoyogur83
1 year, 10 months agoZeus009
2 years agocantbeme
2 years, 1 month agosimonseztech
2 years, 1 month agoAdityaGupta
2 years, 1 month agotomtmario
2 years, 2 months agochoquedi
2 years, 3 months ago