Recall & Review
beginner
What is the core principle of Zero Trust Architecture?
Never trust, always verify. This means no user or device is trusted by default, even if inside the network.
Click to reveal answer
beginner
Why does Zero Trust Architecture assume breach?
It assumes attackers may already be inside the network, so continuous verification and strict access controls are needed.
Click to reveal answer
intermediate
Name two key components of Zero Trust Architecture.
1. Strong identity verification (like multi-factor authentication). 2. Least privilege access (users get only the access they need).
Click to reveal answer
intermediate
How does Zero Trust Architecture handle device security?
It continuously checks device health and compliance before allowing access, ensuring only trusted devices connect.
Click to reveal answer
beginner
What role does network segmentation play in Zero Trust?
It divides the network into smaller parts to limit access and reduce the impact if a breach occurs.
Click to reveal answer
What does Zero Trust Architecture primarily focus on?
✗ Incorrect
Zero Trust means never trusting users or devices without verifying their identity and security status.
Which of the following is a key practice in Zero Trust Architecture?
✗ Incorrect
Least privilege access means users get only the minimum access needed, reducing risk.
Why is continuous monitoring important in Zero Trust?
✗ Incorrect
Continuous monitoring helps detect suspicious activity and respond before damage occurs.
What does network segmentation help prevent in Zero Trust?
✗ Incorrect
Segmenting the network limits how far an attacker can move if they breach one part.
Which technology supports strong identity verification in Zero Trust?
✗ Incorrect
Multi-factor authentication adds extra layers of identity proof beyond just passwords.
Explain the main idea behind Zero Trust Architecture and why it is important in cybersecurity.
Think about how trusting everyone inside a network can be risky.
You got /3 concepts.
Describe how network segmentation and least privilege access work together in Zero Trust Architecture.
Consider how dividing a network and limiting user rights help security.
You got /3 concepts.