An organization is planning to adopt a zero-trust architecture. Which of the following is most aligned with this approach?
Comprehensive and Detailed Step-by-Step
Network segmentation supports zero-trust principles by ensuring sensitive systems are isolated and access is restricted based on identity, role, and context. Unlike traditional models, zero-trust architecture does not automatically trust authenticated users or internal network traffic. It enforces strict access controls to minimize risk.
CompTIA CySA+ Study Guide (Chapter 2: Zero Trust and Network Segmentation, Page 52)
CompTIA CySA+ Objectives (Domain 1.1 - Zero Trust Architecture)
Valentin
5 months agoOzell
5 months agoArlette
5 months agoIsabelle
4 months agoCarey
4 months agoJanine
4 months agoGenevive
4 months agoKenny
4 months agoGlendora
4 months agoErnie
4 months agoAdell
5 months agoValentin
5 months agoKathrine
5 months agoAudria
4 months agoNickie
4 months agoStefany
5 months agoCraig
5 months agoOzell
6 months agoWilletta
6 months agoRoxane
5 months agoShala
5 months agoFallon
5 months ago