
Answer-first summary for fast verification
Answer: Adopt a 'never trust, always verify' approach with continuous authentication and monitoring.
A 'never trust, always verify' approach aligns with Zero Trust principles, ensuring that all access requests are authenticated and authorized continuously. This approach is adaptable to both legacy systems and new cloud-based applications, promoting a secure digital transformation.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Discuss how you would design a Zero Trust security framework for an organization undergoing digital transformation, incorporating the Zero Trust Rapid Modernization Plan (RaMP). Consider the key principles of Zero Trust and how they can be applied to secure both legacy systems and new cloud-based applications.
A
Implement strict perimeter-based security and ignore internal segmentation.
B
Adopt a 'never trust, always verify' approach with continuous authentication and monitoring.
C
Use traditional firewall and VPN solutions without adapting to Zero Trust principles.
D
Rely solely on user credentials for access control without additional verification mechanisms.
No comments yet.