Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CS0-003 Topic 3 Question 38 Discussion

Actual exam question for CompTIA's CS0-003 exam
Question #: 38
Topic #: 3
[All CS0-003 Questions]

An organization is planning to adopt a zero-trust architecture. Which of the following is most aligned with this approach?

Show Suggested Answer Hide Answer
Suggested Answer: A

Comprehensive and Detailed Step-by-Step

Network segmentation supports zero-trust principles by ensuring sensitive systems are isolated and access is restricted based on identity, role, and context. Unlike traditional models, zero-trust architecture does not automatically trust authenticated users or internal network traffic. It enforces strict access controls to minimize risk.


CompTIA CySA+ Study Guide (Chapter 2: Zero Trust and Network Segmentation, Page 52)

CompTIA CySA+ Objectives (Domain 1.1 - Zero Trust Architecture)

Contribute your Thoughts:

Valentin
2 months ago
I still think A) Network segmentation is the best choice for zero-trust architecture.
upvoted 0 times
...
Ozell
2 months ago
I see your point, Adell. Whitelisting can help, but network segmentation is more comprehensive in enforcing zero-trust.
upvoted 0 times
...
Arlette
2 months ago
Trusting internal traffic? That's like letting the fox guard the henhouse. Zero-trust all the way, baby!
upvoted 0 times
Isabelle
21 days ago
A) Network segmentation to separate sensitive systems from the rest of the network.
upvoted 0 times
...
Carey
23 days ago
Trusting internal traffic is risky. Zero-trust is the way to go!
upvoted 0 times
...
Janine
29 days ago
C) Trusting users who successfully authenticate once with multifactor authentication.
upvoted 0 times
...
Genevive
1 months ago
B) Whitelisting specific IP addresses that are allowed to access the network.
upvoted 0 times
...
Kenny
1 months ago
B) Whitelisting specific IP addresses that are allowed to access the network.
upvoted 0 times
...
Glendora
1 months ago
A) Network segmentation to separate sensitive systems from the rest of the network.
upvoted 0 times
...
Ernie
1 months ago
A) Network segmentation to separate sensitive systems from the rest of the network.
upvoted 0 times
...
...
Adell
2 months ago
But what about option B) Whitelisting specific IP addresses? Wouldn't that also align with zero-trust?
upvoted 0 times
...
Valentin
2 months ago
I agree with Ozell, because zero-trust architecture requires segmenting sensitive systems.
upvoted 0 times
...
Kathrine
2 months ago
Ah, the classic network segmentation approach. It's like building a firewall around your sensitive data - except the firewall is made of Swiss cheese.
upvoted 0 times
Audria
1 months ago
D) Automatically trusting internal network communications over external traffic.
upvoted 0 times
...
Nickie
1 months ago
C) Trusting users who successfully authenticate once with multifactor authentication.
upvoted 0 times
...
Stefany
2 months ago
B) Whitelisting specific IP addresses that are allowed to access the network.
upvoted 0 times
...
Craig
2 months ago
A) Network segmentation to separate sensitive systems from the rest of the network.
upvoted 0 times
...
...
Ozell
3 months ago
I think the answer is A) Network segmentation.
upvoted 0 times
...
Willetta
3 months ago
Option C is the way to go! I mean, who needs constant verification when you've got that sweet sweet MFA?
upvoted 0 times
Roxane
2 months ago
User 3: Option C is convenient, but I think network segmentation is more secure in the long run.
upvoted 0 times
...
Shala
2 months ago
User 2: I agree, keeping sensitive systems separate is crucial for security.
upvoted 0 times
...
Fallon
2 months ago
User 1: I think option A is the best choice. Network segmentation is key for zero-trust.
upvoted 0 times
...
...

Save Cancel