An organization is planning to adopt a zero-trust architecture. Which of the following is most aligned with this approach?
Comprehensive and Detailed Step-by-Step
Network segmentation supports zero-trust principles by ensuring sensitive systems are isolated and access is restricted based on identity, role, and context. Unlike traditional models, zero-trust architecture does not automatically trust authenticated users or internal network traffic. It enforces strict access controls to minimize risk.
CompTIA CySA+ Study Guide (Chapter 2: Zero Trust and Network Segmentation, Page 52)
CompTIA CySA+ Objectives (Domain 1.1 - Zero Trust Architecture)
Valentin
3 months agoOzell
3 months agoArlette
3 months agoIsabelle
2 months agoCarey
2 months agoJanine
2 months agoGenevive
3 months agoKenny
3 months agoGlendora
3 months agoErnie
3 months agoAdell
3 months agoValentin
4 months agoKathrine
4 months agoAudria
3 months agoNickie
3 months agoStefany
3 months agoCraig
3 months agoOzell
4 months agoWilletta
4 months agoRoxane
3 months agoShala
3 months agoFallon
4 months ago