Weekend Sale Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cloud Security Alliance CCZT Certificate of Competence in Zero Trust (CCZT) Exam Practice Test

Page: 1 / 6
Total 60 questions

Certificate of Competence in Zero Trust (CCZT) Questions and Answers

Question 1

During ZT planning, which of the following determines the scope of

the target state definition? Select the best answer.

Options:

A.

Risk appetite

B.

Risk assessment

C.

Service level agreements

D.

Risk register

Question 2

Scenario: As a ZTA security administrator, you aim to enforce the

principle of least privilege for private cloud network access. Which

ZTA policy entity is mainly responsible for crafting and maintaining

these policies?

Options:

A.

Gateway enforcing access policies

B.

Policy enforcement point (PEP)

C.

Policy administrator (PA)

D.

Policy decision point (PDP)

Question 3

When planning for a ZTA, a critical product of the gap analysis

process is______

Select the best answer.

Options:

A.

a responsible, accountable, consulted, and informed (RACI) chart

and communication plan

B.

supporting data for the project business case

C.

the implementation's requirements

D.

a report on impacted identity and access management (IAM)

infrastructure

Question 4

To respond quickly to changes while implementing ZT Strategy, an

organization requires a mindset and culture of

Options:

A.

learning and growth.

B.

continuous risk evaluation and policy adjustment.

C.

continuous process improvement.

D.

project governance.

Question 5

What is a server exploitation threat that SDP features (server isolation, single packet authorization [SPA], and dynamic drop-all firewalls) protect against?

Options:

A.

Certificate forgery attacks

B.

Denial of service (DoS)/distributed denial of service (DDoS) attacks

C.

Phishing attacks

D.

Domain name system (DNS) poisoning attacks

Question 6

Which ZT element provides information that providers can use to

keep policies dynamically updated?

Options:

A.

Communication

B.

Data sources

C.

Identities

D.

Resources

Question 7

Which of the following is a required concept of single packet

authorizations (SPAs)?

Options:

A.

An SPA packet must be digitally signed and authenticated.

B.

An SPA packet must self-contain all necessary information.

C.

An SPA header is encrypted and thus trustworthy.

D.

Upon receiving an SPA, a server must respond to establish secure

connectivity.

Question 8

ZTA utilizes which of the following to improve the network's security posture?

Options:

A.

Micro-segmentation and encryption

B.

Compliance analytics and network communication

C.

Network communication and micro-segmentation

D.

Encryption and compliance analytics

Question 9

Which activity of the ZT implementation preparation phase ensures

the resiliency of the organization's operations in the event of

disruption?

Options:

A.

Change management process

B.

Business continuity and disaster recovery

C.

Visibility and analytics

D.

Compliance

Question 10

Which of the following is a common activity in the scope, priority,

and business case steps of ZT planning?

Options:

A.

Determine the organization's current state

B.

Prioritize protect surfaces

O C. Develop a target architecture

C.

Identify business and service owners

Question 11

To ensure an acceptable user experience when implementing SDP, a

security architect should collaborate with IT to do what?

Options:

A.

Plan to release SDP as part of a single major change or a "big-bang"

implementation.

B.

Model and plan the user experience, client software distribution,

and device onboarding processes.

C.

Build the business case for SDP, based on cost modeling and

business value.

D.

Advise IT stakeholders that the security team will fully manage all

aspects of the SDP rollout.

Question 12

Which security tools or capabilities can be utilized to automate the

response to security events and incidents?

Options:

A.

Single packet authorization (SPA)

B.

Security orchestration, automation, and response (SOAR)

C.

Multi-factor authentication (MFA)

D.

Security information and event management (SIEM)

Question 13

Which of the following is a potential outcome of an effective ZT

implementation?

Options:

A.

Regular vulnerability scanning

B.

A comprehensive catalogue of all transactions, dependencies, and

services with associated IDs

C.

Deployment of traditional firewall solutions

D.

Adoption of biometric authentication

Question 14

Which component in a ZTA is responsible for deciding whether to

grant access to a resource?

Options:

A.

The policy enforcement point (PEP)

B.

The policy administrator (PA)

C.

The policy engine (PE)

D.

The policy component

Question 15

Of the following options, which risk/threat does SDP mitigate by

mandating micro-segmentation and implementing least privilege?

Options:

A.

Identification and authentication failures

B.

Injection

C.

Security logging and monitoring failures

D.

Broken access control

Question 16

In a ZTA, automation and orchestration can increase security by

using the following means:

Options:

A.

Kubernetes and docker

B.

Static application security testing (SAST) and dynamic application

security testing (DAST)

C.

Data loss prevention (DLP) and cloud security access broker (CASB)

D.

Infrastructure as code (laC) and identity lifecycle management

Question 17

In a ZTA, what is a key difference between a policy decision point

(PDP) and a policy enforcement point (PEP)?

Options:

A.

A PDP measures incoming signals against a set of access

determination criteria. A PEP uses incoming signals to open or close a

connection.

B.

A PDP measures incoming signals and makes dynamic risk

determinations. A PEP uses incoming signals to make static risk

determinations.

C.

A PDP measures incoming control plane authentication signals. A

PEP measures incoming data plane authorization signals.

D.

A PDP measures incoming signals in an untrusted zone. A PEP

measures incoming signals in an implicit trust zone.

Question 18

SDP features, like multi-factor authentication (MFA), mutual

transport layer security (mTLS), and device fingerprinting, protect

against

Options:

A.

phishing

B.

certificate forgery

C.

domain name system (DNS) poisoning

D.

code injections

Page: 1 / 6
Total 60 questions