1.8 Zero Trust Flashcards

N10-009 Obj. 1.8 Summarize evolving use cases for modern network environments. (10 cards)

1
Q

What is the traditional approach to network security and its limitation?

A

Traditionally, security focuses on protecting the network perimeter, but once inside, the network was broadly accessible, creating internal vulnerabilities.

Transcript: “Traditionally, we’ve always done a good job at protecting the edges of our network… But once you’re on the inside… very accessible.” (0:01–0:16)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Zero Trust and its core principle?

A

Zero Trust is a security model where no user, device, or application is trusted by default, and all access must be verified.

Transcript: “With zero trust, every user, every device, and every application is inherently untrusted.” (0:35–0:42)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What technologies support a Zero Trust model?

A

Authentication, encyption, internal firewalls, network monitoring, and other layered security controls.

Transcript: “We’ll be implementing technologies… authentication, encryption, additional firewalls, monitoring…” (0:51–1:00)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is adaptive identity in authentication?

A

It adjusts authentication requirements based on user identity, location, IP address, and behavior to assess risk.

Transcript: “With an adaptive identity, every authentication process considers who’s trying to authenticate…” (1:23–2:01)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What factors can influence access after authentication (Authorization)?

A

User roles, location, device certification, and job-based permissions determine what data and functions are accessible.

Transcript: “We need to understand what type of access that user should have… part of the help desk… manager…” (2:56–3:29)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why should admin rights be limited?

A

Admin rights give full system access, and if compromised (e.g., via malware), they pose a significant security risk.

A best practice is to provide the least access needed to complete your job – Least Privilege Access

Transcript: “Administrators have full access… malware now has administrative access…” (4:11–4:29)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What challenge does user and application dispersion create?

A

Users and apps are globally distributed, making it difficult to secure communications across varied environments.

Transcript: “Users can be located anywhere… applications… across the internet… private data center.” (4:31–4:56)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is SASE and what does it provide?

A

SASE (Secure Access Service Edge) is a cloud-based security framework offering secure, seamless access to resources regardless of user or application location.

Transcript: “SASE… stands for Secure Access Service Edge… security technologies into the cloud…” (5:05–5:24)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What features can be part of a SASE solution?

A

Zero Trust Network Access, Firewall-as-a-Service, DNS security, and built-in QoS and routing.

Transcript: “Zero trust network access, firewall as a service, and DNS security…” (6:03–6:08)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does SASE benefit end users?

A

It offers seamless, always-on security without requiring users to manually manage their securite connections.

Transcript: “Users don’t have to worry about turning on or turning off this SASE functionality…” (6:14–6:21)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly