
Answer-first summary for fast verification
Answer: Continuous authentication, micro-segmentation, and least privilege access controls integrated with behavioral analytics.
**Correct Answer: D** - **Continuous authentication**: Ensures users are authenticated throughout their session, not just at login, preventing unauthorized access post-initial authentication. - **Micro-segmentation**: Divides the network into isolated segments to limit breach impacts, restricting access based on least privilege. - **Least privilege access controls**: Grants users access only to necessary resources, minimizing unauthorized data access risks. - **Behavioral analytics**: Analyzes user behavior to detect anomalies and identify threats in real-time, enhancing platform security. These components are vital for a zero trust architecture, ensuring all access requests are securely authenticated, authorized, and encrypted, irrespective of their origin.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
When designing a zero trust architecture for a data platform, which elements are essential to ensure every access request is authenticated, authorized, and encrypted, no matter where it originates?
A
Traditional perimeter-based security models supplemented with 2FA for internal access.
B
Mandatory VPN usage for all data access, paired with regular password rotation policies.
C
Network segmentation, VPN access, and firewall rules based on static IP addresses.
D
Continuous authentication, micro-segmentation, and least privilege access controls integrated with behavioral analytics.