Zero Trust Flashcards

(9 cards)

1
Q

Zero Trust

A

Zero Trust → A security model that assumes no user or device should be trusted by default, requiring continuous verification and strict access control for every connection or request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Policy-Based Authentication

A

Policy-Based Authentication → Access decisions are made dynamically based on predefined policies such as user identity, device type, location, and time of request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Adaptive Identity

A

Adaptive Identity → Continuously evaluates user behavior and context to adjust authentication requirements, such as adding multifactor authentication if activity seems unusual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Policy-Driven Access Control

A

Policy-Driven Access Control → Restricts access to network resources using centralized policies that define who can access what, when, and under what conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

Authentication → The process of verifying a user’s or device’s identity before granting network access, often through passwords, certificates, or multifactor methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authorization

A

Authorization → Determines what resources an authenticated user or device is allowed to access based on their assigned privileges or roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Accounting

A

Accounting → Tracks and records user activity and resource usage on the network for auditing, monitoring, and compliance purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Least Privilege Access

A

Least Privilege Access → A security principle that grants users the minimum level of access required to perform their tasks, reducing the risk of misuse or breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SASE

A

Secure Access Service Edge → A next-generation VPN model combining network security functions like Zero Trust, firewall, and secure web gateway into a single cloud-based service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly