New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CSA CCZT Exam - Topic 1 Question 36 Discussion

Actual exam question for CSA's CCZT exam
Question #: 36
Topic #: 1
[All CCZT Questions]

Which ZT tenet is based on the notion that malicious actors reside

inside and outside the network?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Adelle
3 months ago
Surprised this is even a question, it's so obvious!
upvoted 0 times
...
Kerry
3 months ago
A is right, but B has its merits too.
upvoted 0 times
...
Noah
3 months ago
Wait, are we sure about that? I thought it was B.
upvoted 0 times
...
Julio
3 months ago
Totally agree, that makes the most sense.
upvoted 0 times
...
Hermila
4 months ago
It's definitely A, assume breach!
upvoted 0 times
...
Herschel
4 months ago
I feel like "Scrutinize explicitly" could also fit, but I lean towards A since it directly addresses the idea of internal and external threats.
upvoted 0 times
...
Scarlet
4 months ago
I practiced a similar question, and I think it was about the importance of not trusting anything by default. That sounds like A to me.
upvoted 0 times
...
Wayne
4 months ago
I'm not entirely sure, but I remember something about "Assume a hostile environment" being related to this concept too.
upvoted 0 times
...
Emilio
4 months ago
I think the answer is A, "Assume breach." It really emphasizes that threats can come from anywhere, right?
upvoted 0 times
...
Tony
5 months ago
This is a tricky one. I'm going to have to review my notes on the ZT tenets to make sure I understand the differences between them. I don't want to guess and risk getting it wrong.
upvoted 0 times
...
Richelle
5 months ago
Okay, I think I've got it. The "assume breach" tenet is the one that's based on the idea that there are bad actors both inside and outside the network. That makes sense as a core principle of the zero trust approach.
upvoted 0 times
...
Rasheeda
5 months ago
Hmm, I'm a bit unsure about this one. The options all sound similar, and I'm not totally clear on the differences between the ZT tenets. I'll have to think this through carefully.
upvoted 0 times
...
Susy
5 months ago
This one seems pretty straightforward. The key is to focus on the ZT tenets and figure out which one is based on the idea of malicious actors both inside and outside the network.
upvoted 0 times
...
An
5 months ago
"Assume breach" is the answer. That tenet is all about recognizing that the network is already compromised, so you have to continuously verify and validate everything, regardless of where the threats are coming from.
upvoted 0 times
...
Francoise
5 months ago
I'm a little confused by the wording of this question. I'll have to re-read it a few times to make sure I understand which tenet it's asking about. Hopefully I can figure it out before time runs out.
upvoted 0 times
...
Wendell
5 months ago
Okay, I've got this. The "Assume breach" tenet is the one that's based on the idea of malicious actors inside and outside the network. Gotta remember that for the exam.
upvoted 0 times
...
Blair
5 months ago
Hmm, I'm a bit unsure about this one. The options all sound similar, but I think I'll go with "Assume breach" since that seems to match the description in the question.
upvoted 0 times
...
Tomoko
5 months ago
This one seems pretty straightforward. The key is to focus on the ZT tenets and think about which one is based on the idea of malicious actors both inside and outside the network.
upvoted 0 times
...
Ena
9 months ago
Wait, is 'Requiring continuous monitoring' even a real Zero Trust tenet? That sounds like something my grandma would come up with. 'Assume breach' is clearly the way to go.
upvoted 0 times
Carolynn
8 months ago
Wait, is 'Requiring continuous monitoring' even a real Zero Trust tenet? That sounds like something my grandma would come up with. 'Assume breach' is clearly the way to go.
upvoted 0 times
...
Leonor
8 months ago
The ZT tenet of assume breach is based on the notion that malicious actors reside inside and outside the network, and that any user, device, or service can be compromised at any time. Therefore, ZT requires continuous verification and validation of all entities and transactions, and does not rely on implicit trust or perimeter-based defenses
upvoted 0 times
...
Shawna
8 months ago
D) Requiring continuous monitoring
upvoted 0 times
...
Ahmed
8 months ago
C) Scrutinize explicitly
upvoted 0 times
...
Carlee
8 months ago
B) Assume a hostile environment
upvoted 0 times
...
Leandro
9 months ago
A) Assume breach
upvoted 0 times
...
...
Laine
9 months ago
Haha, 'Requiring continuous monitoring'? Seriously? Might as well just unplug the whole network and live in a cave. 'Assume breach' all the way, baby!
upvoted 0 times
...
Janine
9 months ago
Hmm, this is a tough call. 'Scrutinize explicitly' sounds like it could be the right answer, but 'Assume breach' just makes more sense to me. Can't be too careful with all these hackers out there!
upvoted 0 times
Virgina
8 months ago
'Scrutinize explicitly' may sound good, but 'Assume breach' is definitely the way to go in today's cyber environment.
upvoted 0 times
...
Titus
8 months ago
I agree, 'Assume breach' is the right choice. We can't afford to take any risks.
upvoted 0 times
...
Bev
8 months ago
I think 'Assume breach' is the correct answer. It's better to be safe than sorry.
upvoted 0 times
...
...
Skye
10 months ago
I'm feeling confident about this one. Gotta be 'Assume a hostile environment' - that's the foundation of Zero Trust, right? Can't trust anyone or anything these days.
upvoted 0 times
Pamella
9 months ago
C) Scrutinize explicitly
upvoted 0 times
...
Alba
9 months ago
B) Assume a hostile environment
upvoted 0 times
...
Elise
9 months ago
C) Scrutinize explicitly
upvoted 0 times
...
Cristal
9 months ago
A) Assume breach
upvoted 0 times
...
Jacqueline
9 months ago
B) Assume a hostile environment
upvoted 0 times
...
Jovita
10 months ago
A) Assume breach
upvoted 0 times
...
...
Carli
10 months ago
Ooh, this is a tricky one! I'd have to go with 'Assume breach' - the whole idea of Zero Trust is that you can't trust anything, even if it's inside your network.
upvoted 0 times
Miles
9 months ago
Continuous monitoring is crucial to detect any potential threats, both inside and outside the network.
upvoted 0 times
...
Roy
9 months ago
That's right, Zero Trust is all about being proactive and not relying on traditional security measures.
upvoted 0 times
...
Shoshana
10 months ago
It's important to always be vigilant and not assume anything is safe.
upvoted 0 times
...
Louvenia
10 months ago
I agree, 'Assume breach' is a key tenet of Zero Trust.
upvoted 0 times
...
...
Reita
11 months ago
I'm not sure, I think it could also be B) Assume a hostile environment. Malicious actors can come from both inside and outside the network.
upvoted 0 times
...
Darnell
11 months ago
I agree with you, Arletta. The ZT tenet of assume breach makes sense in today's cybersecurity landscape.
upvoted 0 times
...
Arletta
11 months ago
I think the answer is A) Assume breach.
upvoted 0 times
...

Save Cancel