01. Which role is most critical in a Zero Trust implementation for determining access privileges as part of their data governance responsibilities?
a) Asset custodian
b) End users
c) Asset owner
d) IT administrators
02. The key logical components of a ZTA include which of the following?
a) Firewalls, intrusion detection systems, and VPNs
b) Policy decision point, policy enforcement point, and data sources
c) Identity providers, cloud access security brokers, and micro-segmentation
d) Initiating hosts, accepting hosts, and SDP gateways
03. What was a key emphasis of Zero Trust when it was first coined by John Kindervag around 2010?
a) Network traffic inside the perimeter can be trusted by default
b) Requests only need a single verification at the network perimeter
c) Trusted users should be granted broad access without re-verification
d) All network traffic is untrusted and requests need verification at each step
04. In a Zero Trust Architecture, which of the following tasks are required to effectively apply Zero Trust principles to data resources?
a) Discover, inventory, categorize, and control data resources
b) Ship logs from the PDP and PEP to separate SIEMs for each resource
c) Define transaction flows only for sensitive data resources
d) Use the identity store only to identify privileged users' data access
05. Why is alignment with business functions and compliance requirements important for Zero Trust implementation?
a) It allows the organization to ignore compliance requirements in favor of Zero Trust principles
b) It ensures Zero Trust is implemented exactly the same way across all business functions
c) It ensures that Zero Trust practices adhere to regulations while supporting the organization's objectives
d) It mandates that compliance audits are no longer necessary after Zero Trust adoption
06. What is CSA's SDP approach designed to enable through on-demand, dynamically provisioned isolated networks?
a) Elimination of the need for network segmentation
b) Enforcement of Zero Trust principles
c) Replacement of firewalls with software-based controls
d) Increased network visibility for all connected devices
07. Which Zero Trust cross-cutting capability aggregates logs from ZT components to enable dashboards, event correlation, threat analysis and policy monitoring?
a) Visibility and Analytics
b) Governance
c) Identity
d) Automation and Orchestration
08. How should a Zero Trust target architecture implementation leverage the five ZT pillars and three cross-cutting capabilities?
a) Implement each pillar and capability sequentially and in isolation
b) Focus only on the five pillars; the cross-cutting capabilities are optiona
c) Define and prioritize implementation tasks across all pillars and capabilities
d) Let each pillar team independently decide their own implementation approach
09. Which of the following is a key challenge in adopting Zero Trust for an organization with legacy systems and infrastructure?
a) Legacy systems always require immediate Zero Trust upgrades
b) Limited network and asset visibility hinders the transition to Zero Trust
c) Legacy infrastructure has no impact on adopting Zero Trust models
d) Organizations with less mature measurement programs adapt to Zero Trust more easily
10. What is a key principle for maintaining the integrity and resilience of Zero Trust environments?
a) Automation, orchestration, and infrastructure as code play critical roles
b) Relying primarily on manual processes and human intervention
c) Implementing a traditional network perimeter security model
d) Granting implicit trust to devices within the corporate network