FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following is a practice that a zero trust architecture is designed to protect against?
A
Zero-day vulnerabilities
B
External threats
C
Deauthentication
D
Lateral movement
Explanation: 

Detailed explanation-1: -Microsegmentation and least-privilege access principles are applied to minimize lateral movement.

Detailed explanation-2: -Zero Trust is a framework for securing infrastructure and data for today’s modern digital transformation. It uniquely addresses the modern challenges of today’s business, including securing remote workers, hybrid cloud environments, and ransomware threats.

Detailed explanation-3: -Preventing lateral movement Zero Trust is designed to contain attackers so that they cannot move laterally. Because Zero Trust access is segmented and has to be re-established periodically, an attacker cannot move across to other microsegments within the network.

Detailed explanation-4: -How Zero Trust Network Access (ZTNA) Prevents Lateral Movement After a Breach. Zero Trust Network Access (ZTNA) is a modern approach to access control that makes an organization’s protected resources more secure from cyberattacks.

There is 1 question to complete.