Complete the code to identify the core principle of zero trust architecture.
Zero trust means never trust, always [1].Zero trust architecture is based on the principle of never trusting any user or device by default and always verifying their identity and permissions before granting access.
Complete the sentence to describe a key feature of zero trust.
In zero trust, access is granted based on [1] rather than network location.Zero trust architecture grants access based on verifying the user's identity and device health, not just where they are connecting from.
Fix the error in the statement about zero trust architecture.
Zero trust assumes all internal network traffic is [1].Zero trust architecture treats all network traffic, including internal, as untrusted and requires verification for every access request.
Fill both blanks to complete the zero trust access control rule.
Access is granted only if the user [1] and the device [2] security policies.
Zero trust requires that the user passes authentication checks and the device complies with security policies before access is granted.
Fill all three blanks to complete the zero trust principle about network segmentation.
Zero trust uses [1] to divide the network, [2] access controls, and continuous [3] to monitor activity.
Zero trust architecture uses micro-segmentation to break the network into smaller parts, applies strict access controls, and continuously verifies activity to reduce risk.