Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CSA Exam CCZT Topic 1 Question 36 Discussion

Actual exam question for CSA's CCZT exam
Question #: 36
Topic #: 1
[All CCZT Questions]

Which ZT tenet is based on the notion that malicious actors reside

inside and outside the network?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Ena
2 months ago
Wait, is 'Requiring continuous monitoring' even a real Zero Trust tenet? That sounds like something my grandma would come up with. 'Assume breach' is clearly the way to go.
upvoted 0 times
Carolynn
9 days ago
Wait, is 'Requiring continuous monitoring' even a real Zero Trust tenet? That sounds like something my grandma would come up with. 'Assume breach' is clearly the way to go.
upvoted 0 times
...
Leonor
11 days ago
The ZT tenet of assume breach is based on the notion that malicious actors reside inside and outside the network, and that any user, device, or service can be compromised at any time. Therefore, ZT requires continuous verification and validation of all entities and transactions, and does not rely on implicit trust or perimeter-based defenses
upvoted 0 times
...
Shawna
18 days ago
D) Requiring continuous monitoring
upvoted 0 times
...
Ahmed
24 days ago
C) Scrutinize explicitly
upvoted 0 times
...
Carlee
27 days ago
B) Assume a hostile environment
upvoted 0 times
...
Leandro
2 months ago
A) Assume breach
upvoted 0 times
...
...
Laine
2 months ago
Haha, 'Requiring continuous monitoring'? Seriously? Might as well just unplug the whole network and live in a cave. 'Assume breach' all the way, baby!
upvoted 0 times
...
Janine
2 months ago
Hmm, this is a tough call. 'Scrutinize explicitly' sounds like it could be the right answer, but 'Assume breach' just makes more sense to me. Can't be too careful with all these hackers out there!
upvoted 0 times
Virgina
26 days ago
'Scrutinize explicitly' may sound good, but 'Assume breach' is definitely the way to go in today's cyber environment.
upvoted 0 times
...
Titus
28 days ago
I agree, 'Assume breach' is the right choice. We can't afford to take any risks.
upvoted 0 times
...
Bev
1 months ago
I think 'Assume breach' is the correct answer. It's better to be safe than sorry.
upvoted 0 times
...
...
Skye
3 months ago
I'm feeling confident about this one. Gotta be 'Assume a hostile environment' - that's the foundation of Zero Trust, right? Can't trust anyone or anything these days.
upvoted 0 times
Pamella
2 months ago
C) Scrutinize explicitly
upvoted 0 times
...
Alba
2 months ago
B) Assume a hostile environment
upvoted 0 times
...
Elise
2 months ago
C) Scrutinize explicitly
upvoted 0 times
...
Cristal
2 months ago
A) Assume breach
upvoted 0 times
...
Jacqueline
2 months ago
B) Assume a hostile environment
upvoted 0 times
...
Jovita
2 months ago
A) Assume breach
upvoted 0 times
...
...
Carli
3 months ago
Ooh, this is a tricky one! I'd have to go with 'Assume breach' - the whole idea of Zero Trust is that you can't trust anything, even if it's inside your network.
upvoted 0 times
Miles
2 months ago
Continuous monitoring is crucial to detect any potential threats, both inside and outside the network.
upvoted 0 times
...
Roy
2 months ago
That's right, Zero Trust is all about being proactive and not relying on traditional security measures.
upvoted 0 times
...
Shoshana
2 months ago
It's important to always be vigilant and not assume anything is safe.
upvoted 0 times
...
Louvenia
3 months ago
I agree, 'Assume breach' is a key tenet of Zero Trust.
upvoted 0 times
...
...
Reita
3 months ago
I'm not sure, I think it could also be B) Assume a hostile environment. Malicious actors can come from both inside and outside the network.
upvoted 0 times
...
Darnell
4 months ago
I agree with you, Arletta. The ZT tenet of assume breach makes sense in today's cybersecurity landscape.
upvoted 0 times
...
Arletta
4 months ago
I think the answer is A) Assume breach.
upvoted 0 times
...

Save Cancel