Zero Trust Flashcards Lesson 1.2

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

flashcard set

Earn XP

Description and Tags

Security + CompTIA Flashcards

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

What is a major vulnerability of traditional networks once past the firewall?

They allow free movement between systems with minimal security checks, enabling unauthorized access and malware spread.

2
New cards

What is the core principle of zero trust architecture?

“Never trust, always verify”—requiring continuous authentication for every access attempt.

3
New cards

What are some key components of zero trust security?

Multi-factor authentication, data encryption, system permissions, firewalls, and layered security policies.

4
New cards

How can zero trust be implemented in network architecture?

By decomposing security devices into functional components or planes of operation.

5
New cards

What are the two primary planes in network architecture?

Data Plane (handles traffic) and Control Plane (manages configurations and policies).

6
New cards

What does adaptive identity authentication evaluate?

Origin of request, location, user role, network type, and IP address.

7
New cards

How can network access points be restricted to reduce risk?

By limiting access to users inside the building or via VPNs.

8
New cards

What are security zones used for?

To categorize network segments and enforce granular access control.

9
New cards

What is the role of a Policy Enforcement Point (PEP)?

To evaluate traffic and collect data for access decisions.

10
New cards

What does the Policy Decision Point (PDP) do?

It analyzes authentication requests and decides on access approval, denial, or revocation.

11
New cards

How does zero trust architecture complete secure communication?

By passing data through PEPs and PDPs, which enforce access based on policy decisions.

12
New cards

Why is the traditional firewall-based trust model inadequate?

It exposes networks to internal threats and lateral movement.

13
New cards

How does zero trust improve network security?

By requiring continuous verification and eliminating implicit trust.

14
New cards

Why is separating data and control planes important?

It allows scalable and dynamic security enforcement.

15
New cards

What makes adaptive identity more secure than traditional methods?

It uses multiple real-world factors to assess authentication risk.

16
New cards

How do security zones enhance access control?

They define boundaries and trust levels for precise access management.

17
New cards

What ensures consistent enforcement of zero trust policies?

The integration of PEPs, PDPs, and Policy Administrators.

18
New cards

What are essential components of zero trust security?

Multi-factor authentication and encryption of data at rest and in transit.

19
New cards

What are examples of control plane management?

Configuring routing tables, firewall rules, and NAT parameters.

20
New cards

How do physical switches demonstrate data/control plane separation?

Interfaces handle data flow; configuration tasks occur in the control plane.

21
New cards

What factors does adaptive identity consider?

Geographic location, IP address, and user role (e.g., contractor vs. employee).

22
New cards

How does limiting entry points enhance security?

It reduces exposure and makes unauthorized access more difficult.

23
New cards

How can security zones be subdivided?

By department or role for fine-grained access control.

24
New cards

What is an example of implicit trust in zones?

Trusted office zone communicating with internal data center zone.

25
New cards

What does the PEP rely on for access decisions?

The Policy Decision Point (PDP).

26
New cards

What decisions can the PDP return

Allow, deny, or revoke access.

27
New cards

What completes the zero trust authorization cycle?

Policy Administrator manages credentials/tokens enforced by the PEP.