Question 7

When planning for a ZTA, a critical product of the gap analysis process is ______
Select the best answer.

Correct Answer:C
A critical product of the gap analysis process is the implementation??s requirements, which are the specifications and criteria that define the desired outcomes, capabilities, and functionalities of the ZTA. The implementation??s requirements are derived from the gap analysis, which identifies the current state, the target state, and the gaps between them. The implementation??s requirements help to guide the design, development, testing, and deployment of the ZTA, as well as the evaluation of its effectiveness and alignment with the business objectives and needs.
References =
✑ Zero Trust Planning - Cloud Security Alliance, section ??Scope, Priority, & Business Case??
✑ The Zero Trust Journey: 4 Phases of Implementation - SEI Blog, section ??Second Phase: Assess??
✑ Planning for a Zero Trust Architecture: A Planning Guide for Federal ??, section ??Gap Analysis??

Question 8

Which of the following is a common activity in the scope, priority, and business case steps of ZT planning?

Correct Answer:A
A common activity in the scope, priority, and business case steps of ZT planning is to determine the organization??s current state. This involves assessing the existing security posture, architecture, policies, processes, and capabilities of the organization, as well as identifying the key stakeholders, business drivers, and goals for the ZT initiative. Determining the current state helps to establish a baseline, identify gaps and risks, and define the scope and priority of the ZT transformation.
References =
✑ Zero Trust Planning - Cloud Security Alliance, section ??Scope, Priority, & Business Case??
✑ The Zero Trust Journey: 4 Phases of Implementation - SEI Blog, section ??First Phase: Prepare??

Question 9

To successfully implement ZT security, two crucial processes must be planned and aligned with existing access procedures that the ZT implementation might impact. What are these two processes?

Correct Answer:B

Question 10

Of the following, which option is a prerequisite action to understand the organization's protect surface clearly?

Correct Answer:A
Data and asset classification is a prerequisite action to understand the organization??s protect surface clearly because it helps to identify the most critical and sensitive data and assets that need to be protected by Zero Trust principles. Data and asset classification also helps to define the appropriate policies and controls for different levels of data and asset sensitivity.
References = Certificate of Competence in Zero Trust (CCZT) - Cloud Security Alliance, Zero Trust Training (ZTT) - Module 2: Data and Asset Classification

Question 11

During ZT planning, which of the following determines the scope of the target state definition? Select the best answer.

Correct Answer:B
Risk assessment is the process of identifying, analyzing, and evaluating the risks that an organization faces in achieving its objectives. Risk assessment helps to determine the scope of the target state definition for ZT planning, as it identifies the critical assets, threats, vulnerabilities, and impacts that need to be addressed by ZT capabilities and activities. Risk assessment also helps to prioritize and align the ZT planning with the organization??s risk appetite and tolerance levels.

Question 12

To ensure an acceptable user experience when implementing SDP, a security architect should collaborate with IT to do what?

Correct Answer:B
To ensure an acceptable user experience when implementing SDP, a security architect should collaborate with IT to model and plan the user experience, client software distribution, and device onboarding processes. This is because SDP requires users to install and use client software to access the protected resources, and the user experience may vary depending on the device type, operating system, network conditions, and security policies. By modeling and planning the user experience, the security architect and IT can ensure that the SDP implementation is user-friendly, consistent, and secure.
References = Certificate of Competence in Zero Trust (CCZT) - Cloud Security Alliance, Zero Trust Training (ZTT) - Module 7: Network Infrastructure and SDP

START CCZT EXAM