exam questions

Exam N10-008 All Questions

View all questions & answers for the N10-008 exam

Exam N10-008 topic 1 question 40 discussion

Actual exam question from CompTIA's N10-008
Question #: 40
Topic #: 1
[All N10-008 Questions]

Within the realm of network security, Zero Trust:

  • A. prevents attackers from moving laterally through a system.
  • B. allows a server to communicate with outside networks without a firewall.
  • C. block malicious software that is too new to be found in virus definitions.
  • D. stops infected files from being downloaded via websites.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Pongsathorn
Highly Voted 3 years, 4 months ago
Zero Trust is a relatively new security model that many corporations are starting to use. As the name indicates, this model seeks to reduce or eliminate security breaches for an organization by trusting absolutely nothing by default. In fact, the credo of this approach is “never trust; always verify.” Zero Trust was created by John Kindervag of Forrester Research. He realized that traditional security models operate on the silly assumption that everything inside an organization’s network should be trusted. With models based on this assumption, once a network attacker has gained access, that user account is trusted. The Zero Trust model views trust as a vulnerability. Zero Trust is implemented using many different technologies in a network, including the following: - Segmenting the network - Preventing lateral movement - Providing Layer 7 threat prevention - Simplifying granular user access control
upvoted 49 times
Trusthemba
2 years, 7 months ago
Good one
upvoted 1 times
...
Sebatian20
1 year, 9 months ago
Incorrect. Zero trust was created by my partner. =(
upvoted 30 times
Dtimap
1 year, 9 months ago
That's rough!
upvoted 5 times
...
...
...
Tyrial
Highly Voted 3 years, 3 months ago
Selected Answer: A
Answer should be A The definition of Zero trust mentions nothing about firewalls, viruses or stopping infected files from being downloaded. Lesson 13: Topic 13A: Privileged Access Management - Zero trust is based on the idea that perimeter security is unlikely to be completely robust. On a modern network, there are just too many opportunities for traffic to escape monitoring/filtering by perimeter devices. Zero trust uses systems such as continuous authentication and conditional access to mitigate privilege escalation and account compromise by threat actors. Another zero-trust technique is to apply microsegmentation. Microsegmentation is a security process that is capable of applying policies to a single node, as though it was in a zone of its own.
upvoted 20 times
...
ItachiUchia
Most Recent 9 months ago
Zero trust is based on the idea that perimeter security is unlikely to be completely robust. On a modern network, there are just too many opportunities for traffic to escape monitoring/filtering by perimeter devices. Zero trust uses systems such as continuous authentication and conditional access to mitigate privilege escalation and account compromise by threat actors. Another zero- trust technique is to apply microsegmentation. Microsegmentation is a security process that is capable of applying policies to a single node, as though it was in a zone of its own.
upvoted 1 times
...
RobinMeykens
10 months, 3 weeks ago
The correct answer is A. prevents attackers from moving laterally through a system. Zero Trust is a security model that assumes that threats can exist both inside and outside the network. It requires strict verification for every person and device trying to access resources on the network. One of its key principles is to prevent lateral movement within the network, thereby limiting the ability of attackers to move from one part of the system to another once they have gained initial access.
upvoted 3 times
...
0b202d9
1 year, 2 months ago
Selected Answer: A
Why a zero trust approach is key to cyber security now? What is Zero Trust Security?| Principles & Benefits- Zscaler Zero trust requires verification from all entities, whatever their device or location, before access is granted. A proactive approach such as this minimizes the potential impact of breaches by limiting lateral movement within the network, reducing the risk of insider threats, and enhancing overall security posture.
upvoted 1 times
...
Jaeide__X
1 year, 2 months ago
Selected Answer: A
Zero Trust is a security model based on the principle of "never trust, always verify." In a Zero Trust architecture, all network traffic, regardless of its source or destination, is considered untrusted. Access controls are enforced based on strict identity verification and continuous authentication, rather than relying solely on perimeter defenses such as firewalls. The primary goal of Zero Trust is to prevent lateral movement by attackers within a system. This means that even if an attacker gains access to a specific part of the network, they are still subjected to authentication and access controls when attempting to access other resources or move laterally within the network. By eliminating implicit trust in any entity, Zero Trust helps organizations minimize the risk of data breaches and unauthorized access.
upvoted 2 times
...
Bo_Knows
1 year, 2 months ago
Selected Answer: A
it should be zero trust
upvoted 1 times
...
nnaaddrr
1 year, 3 months ago
Selected Answer: A
prevent them from roaming freely
upvoted 1 times
...
vinbra
1 year, 3 months ago
Selected Answer: A
How can you guys get confused with these simple questions?
upvoted 2 times
...
Ugo2023
1 year, 6 months ago
Zero Trust is a network security model that assumes no one inside or outside the network should be trusted unless their identification has been thoroughly checked. In a Zero Trust model, anyone trying to access a company network must be continuously verified via mechanisms like multi-factor authentication (MFA) and adaptive authentication. Option A is correct. It prevents attackers from moving laterally through a system. This is achieved by segmenting the network into smaller zones and limiting access to only those who need it.
upvoted 2 times
...
phoenix98
1 year, 6 months ago
Selected Answer: D
zero trust security policies to ensure that all requests and responses are authenticated and authorized.
upvoted 1 times
...
Mehsotopes
1 year, 6 months ago
Selected Answer: C
This is related to Zero Day. Zero trust is meant to block new users & devices not yet known by the network, or employees of the network. To employ zero trust, you must follow these four security framework principles: 1. Re-examine all default access controls. None of your devices are considered a trusted source, because anyone in the network could be a threat & therefore have to be validated. 2. Employ a variety of prevention technique practices relating to defense in depth, this can include things like multifactor authentication, data loss prevention, micro segmentation, & least access privilege assignment methods. 3. Enable real-time monitoring & controls to identify & stop malicious activity quickly. 4. Ensure the network's zero-trust architecture, which should be as follows: Top Secret > Secret > Confidential > Unclassified.
upvoted 2 times
...
Mehsotopes
1 year, 6 months ago
Selected Answer: C
Zero trust is meant to block new users & devices not yet known by the network, or employees of the network. To employ zero trust, you must follow these four security framework principles: 1. Re-examine all default access controls. None of your devices are considered a trusted source, because anyone in the network could be a threat & therefore have to be validated. 2. Employ a variety of prevention technique practices relating to defense in depth, this can include things like multifactor authentication, data loss prevention, micro segmentation, & least access privilege assignment methods. 3. Enable real-time monitoring & controls to identify & stop malicious activity quickly. 4. Ensure the network's zero-trust architecture, which should be as follows: Top Secret > Secret > Confidential > Unclassified.
upvoted 1 times
...
Trickster_ATK
1 year, 7 months ago
Selected Answer: A
It's definitely A.
upvoted 3 times
...
Deznuts1979
1 year, 9 months ago
Selected Answer: A
The correct answer is A.
upvoted 3 times
...
Kelly01
1 year, 11 months ago
Selected Answer: A
A. Zero trust
upvoted 3 times
...
Doaa81
1 year, 11 months ago
Selected Answer: A
A. Prevents attackers from moving laterally through a system.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago