Which activity of the ZT implementation preparation phase ensures
the resiliency of the organization's operations in the event of
disruption?
Scenario: An organization is conducting a gap analysis as a part of
its ZT planning. During which of the following steps will risk
appetite be defined?
Which of the following is a common activity in the scope, priority,
and business case steps of ZT planning?
What steps should organizations take to strengthen access
requirements and protect their resources from unauthorized access
by potential cyber threats?
Which element of ZT focuses on the governance rules that define
the "who, what, when, how, and why" aspects of accessing target
resources?
What measures are needed to detect and stop malicious access
attempts in real-time and prevent damage when using ZTA's
centralized authentication and policy enforcement?
Which component in a ZTA is responsible for deciding whether to
grant access to a resource?
What is the function of the rule-based security policies configured
on the policy decision point (PDP)?
Within the context of risk management, what are the essential
components of an organization's ongoing risk analysis?
Optimal compliance posture is mainly achieved through two key ZT
features:_____ and_____
What is one benefit of the protect surface in a ZTA for an
organization implementing controls?
How can we use ZT to ensure that only legitimate users can access
a SaaS or PaaS? Select the best answer.
When planning for ZT implementation, who will determine valid
users, roles, and privileges for accessing data as part of data
governance?