0
0
Cybersecurityknowledge~10 mins

Zero trust architecture basics in Cybersecurity - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to identify the core principle of zero trust architecture.

Cybersecurity
Zero trust means never trust, always [1].
Drag options to blanks, or click blank then click option'
Aignore
Bassume
Callow
Dverify
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'assume' because it sounds like trusting.
Choosing 'allow' without verification.
2fill in blank
medium

Complete the sentence to describe a key feature of zero trust.

Cybersecurity
In zero trust, access is granted based on [1] rather than network location.
Drag options to blanks, or click blank then click option'
Auser identity
Bdevice age
Cnetwork speed
Dgeographic location
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'device age' which is not a primary factor.
Choosing 'network speed' or 'geographic location' which are irrelevant.
3fill in blank
hard

Fix the error in the statement about zero trust architecture.

Cybersecurity
Zero trust assumes all internal network traffic is [1].
Drag options to blanks, or click blank then click option'
Auntrusted
Bencrypted
Cignored
Dtrusted
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'trusted' because of traditional network trust models.
Choosing 'encrypted' which is a security measure but not the assumption.
4fill in blank
hard

Fill both blanks to complete the zero trust access control rule.

Cybersecurity
Access is granted only if the user [1] and the device [2] security policies.
Drag options to blanks, or click blank then click option'
Ameets authentication
Bfails
Cmeets
Dignores
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'fails' or 'ignores' which would deny access.
5fill in blank
hard

Fill all three blanks to complete the zero trust principle about network segmentation.

Cybersecurity
Zero trust uses [1] to divide the network, [2] access controls, and continuous [3] to monitor activity.
Drag options to blanks, or click blank then click option'
Amicro-segmentation
Bstrict
Cverification
Dbroad
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'broad' which is the opposite of micro-segmentation.
Confusing verification with access control.