Zero Trust

Zero Trust

Assessment

Interactive Video

Computers

9th - 12th Grade

Hard

Created by

Jordan Macurak

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a fundamental principle of the Zero Trust security model?

Once inside the firewall, all internal network traffic is trusted.

Trust is granted based on the user's physical location within the network.

All devices, processes, and users must be continuously verified and nothing is inherently trusted.

Security controls are primarily focused on the network perimeter.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In network security, which plane of operation is responsible for processing frames, packets, and network data, including forwarding and encryption?

Management plane

Control plane

Data plane

Application plane

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which concept involves evaluating multiple risk indicators like physical location, type of connection, and relationship to the organization to strengthen authentication in a Zero Trust environment?

Multi-factor authentication (MFA)

Network Address Translation (NAT)

Adaptive identity

System permissions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of security zones in network security?

To encrypt all data transmissions.

To categorize network connections based on their origin and destination.

To automatically grant access to all internal users.

To prevent all external network traffic.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of a Policy Enforcement Point (PEP) in a network security architecture?

To make authentication decisions.

To generate access tokens and credentials.

To act as a gatekeeper, allowing or disallowing traffic based on policies.

To evaluate access decisions based on policy and other information sources.