An organization is planning to adopt a zero-trust architecture. Which of the following is most aligned with this approach?
Comprehensive and Detailed Step-by-Step
Network segmentation supports zero-trust principles by ensuring sensitive systems are isolated and access is restricted based on identity, role, and context. Unlike traditional models, zero-trust architecture does not automatically trust authenticated users or internal network traffic. It enforces strict access controls to minimize risk.
CompTIA CySA+ Study Guide (Chapter 2: Zero Trust and Network Segmentation, Page 52)
CompTIA CySA+ Objectives (Domain 1.1 - Zero Trust Architecture)
Dong
3 months agoOwen
3 months agoCorinne
3 months agoMabel
4 months agoWilda
4 months agoReta
4 months agoOwen
4 months agoTegan
4 months agoNickolas
5 months agoEdda
5 months agoCorazon
5 months agoElbert
5 months agoMuriel
5 months agoValentin
1 year agoOzell
1 year agoArlette
1 year agoIsabelle
11 months agoCarey
11 months agoJanine
11 months agoGenevive
11 months agoKenny
12 months agoGlendora
12 months agoErnie
12 months agoAdell
1 year agoValentin
1 year agoKathrine
1 year agoAudria
12 months agoNickie
12 months agoStefany
12 months agoCraig
12 months agoOzell
1 year agoWilletta
1 year agoRoxane
1 year agoShala
1 year agoFallon
1 year ago