0
0
Computer Networksknowledge~5 mins

Zero trust network architecture in Computer Networks - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is the main principle of Zero Trust Network Architecture?
The main principle is 'never trust, always verify.' It means no user or device is trusted by default, even if inside the network. Every access request must be verified before granting access.
Click to reveal answer
beginner
How does Zero Trust differ from traditional network security?
Traditional security trusts users and devices inside the network by default. Zero Trust assumes no trust anywhere and requires continuous verification for every access request.
Click to reveal answer
intermediate
Name two key components of Zero Trust Network Architecture.
Two key components are: 1) Strong identity verification (like multi-factor authentication), and 2) Micro-segmentation, which limits access to only what is needed.
Click to reveal answer
intermediate
Why is micro-segmentation important in Zero Trust?
Micro-segmentation divides the network into small zones to control access tightly. This limits the spread of attacks and ensures users only access what they need.
Click to reveal answer
intermediate
What role does continuous monitoring play in Zero Trust?
Continuous monitoring checks user behavior and device health in real time to detect suspicious activity and enforce security policies dynamically.
Click to reveal answer
What does Zero Trust Network Architecture assume about users and devices?
AThey are never trusted by default
BThey are trusted if inside the network
CThey are trusted if they have a password
DThey are trusted if connected via VPN
Which of the following is a key feature of Zero Trust?
AOpen network access
BTrust based on IP address
CMicro-segmentation
DNo authentication needed
What is the purpose of continuous monitoring in Zero Trust?
ATo allow all users access
BTo disable security policies
CTo reduce network speed
DTo detect suspicious activity in real time
Which method strengthens identity verification in Zero Trust?
ASingle password login
BMulti-factor authentication
CNo login required
DIP address filtering only
Zero Trust Network Architecture is best described as:
ANever trust, always verify
BTrust only external users
CTrust everyone inside the network
DTrust based on device type
Explain the core idea of Zero Trust Network Architecture and why it is important.
Think about how traditional networks trust users inside the network.
You got /3 concepts.
    Describe how micro-segmentation helps improve security in a Zero Trust model.
    Consider how breaking a network into smaller parts can control access.
    You got /3 concepts.