Zero Trust

Zero Trust

Assessment

Interactive Video

Computers

9th - 12th Grade

Hard

Created by

Jordan Macurak

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key difference between traditional network security and a Zero Trust approach regarding internal network access?

Traditional networks have more security controls inside the firewall than Zero Trust.

Zero Trust allows more open access inside the firewall compared to traditional networks.

Traditional networks are relatively open on the inside once past the firewall, while Zero Trust verifies everything internally.

Both traditional and Zero Trust models have few security controls once inside the firewall.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement best describes the Zero Trust security model?

It relies on strong perimeter defenses to protect the internal network.

It assumes all internal network traffic is inherently trusted.

It requires verification for every device, process, and person, assuming nothing is inherently trusted.

It focuses solely on user authentication, ignoring device and application security.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of adaptive identity in policy-based authentication?

It only considers the user's username and password for authentication.

It makes the authentication process weaker if the user is inside the building.

It evaluates multiple risk indicators like physical location, connection type, and relationship to the organization.

It grants full administrative access to all users regardless of their connection details.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of implementing least privilege access in IT security?

To grant all users administrative rights for convenience.

To ensure users have exactly what's needed to complete their objective, and no more.

To allow applications to run with maximum privileges for faster performance.

To simplify the management of user accounts by providing broad access.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes Secure Access Service Edge (SASE)?

A traditional VPN solution for connecting to corporate headquarters.

A security model that only protects data centers, not cloud services.

A next-generation VPN that integrates network and security services in the cloud, providing secure access from any location.

A system that requires users to manually enable security features for each application.