An organization is planning to adopt a zero-trust architecture. Which of the following is most aligned with this approach?
Comprehensive and Detailed Step-by-Step
Network segmentation supports zero-trust principles by ensuring sensitive systems are isolated and access is restricted based on identity, role, and context. Unlike traditional models, zero-trust architecture does not automatically trust authenticated users or internal network traffic. It enforces strict access controls to minimize risk.
CompTIA CySA+ Study Guide (Chapter 2: Zero Trust and Network Segmentation, Page 52)
CompTIA CySA+ Objectives (Domain 1.1 - Zero Trust Architecture)
Valentin
4 months agoOzell
4 months agoArlette
4 months agoIsabelle
3 months agoCarey
3 months agoJanine
3 months agoGenevive
3 months agoKenny
3 months agoGlendora
3 months agoErnie
3 months agoAdell
4 months agoValentin
4 months agoKathrine
4 months agoAudria
3 months agoNickie
3 months agoStefany
3 months agoCraig
3 months agoOzell
5 months agoWilletta
5 months agoRoxane
4 months agoShala
4 months agoFallon
4 months ago