An organization is planning to adopt a zero-trust architecture. Which of the following is most aligned with this approach?
Comprehensive and Detailed Step-by-Step
Network segmentation supports zero-trust principles by ensuring sensitive systems are isolated and access is restricted based on identity, role, and context. Unlike traditional models, zero-trust architecture does not automatically trust authenticated users or internal network traffic. It enforces strict access controls to minimize risk.
CompTIA CySA+ Study Guide (Chapter 2: Zero Trust and Network Segmentation, Page 52)
CompTIA CySA+ Objectives (Domain 1.1 - Zero Trust Architecture)
Valentin
2 months agoOzell
2 months agoArlette
2 months agoIsabelle
21 days agoCarey
23 days agoJanine
29 days agoGenevive
1 months agoKenny
1 months agoGlendora
1 months agoErnie
1 months agoAdell
2 months agoValentin
2 months agoKathrine
2 months agoAudria
1 months agoNickie
1 months agoStefany
2 months agoCraig
2 months agoOzell
3 months agoWilletta
3 months agoRoxane
2 months agoShala
2 months agoFallon
2 months ago