0
0
Cybersecurityknowledge~5 mins

Zero trust architecture basics in Cybersecurity - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is the core principle of Zero Trust Architecture?
Never trust, always verify. This means no user or device is trusted by default, even if inside the network.
Click to reveal answer
beginner
Why does Zero Trust Architecture assume breach?
It assumes attackers may already be inside the network, so continuous verification and strict access controls are needed.
Click to reveal answer
intermediate
Name two key components of Zero Trust Architecture.
1. Strong identity verification (like multi-factor authentication). 2. Least privilege access (users get only the access they need).
Click to reveal answer
intermediate
How does Zero Trust Architecture handle device security?
It continuously checks device health and compliance before allowing access, ensuring only trusted devices connect.
Click to reveal answer
beginner
What role does network segmentation play in Zero Trust?
It divides the network into smaller parts to limit access and reduce the impact if a breach occurs.
Click to reveal answer
What does Zero Trust Architecture primarily focus on?
ANever trusting any user or device without verification
BAllowing free access inside the network
CTrusting all internal users by default
DOnly securing the network perimeter
Which of the following is a key practice in Zero Trust Architecture?
ASingle-factor authentication
BLeast privilege access
COpen network access
DIgnoring device health
Why is continuous monitoring important in Zero Trust?
ATo detect and respond to threats quickly
BTo allow unrestricted access
CTo reduce network speed
DTo trust devices once verified
What does network segmentation help prevent in Zero Trust?
ADevice updates
BFaster internet speed
CUser convenience
DWider spread of attacks
Which technology supports strong identity verification in Zero Trust?
APassword only
BGuest access
CMulti-factor authentication
DOpen Wi-Fi
Explain the main idea behind Zero Trust Architecture and why it is important in cybersecurity.
Think about how trusting everyone inside a network can be risky.
You got /3 concepts.
    Describe how network segmentation and least privilege access work together in Zero Trust Architecture.
    Consider how dividing a network and limiting user rights help security.
    You got /3 concepts.