CAS-005 · Question #35
CAS-005 Question #35: Real Exam Question with Answer & Explanation
The correct answer is D: Zero Trust security model. The security diagram proposed by the security architect depicts a Zero Trust security model. Zero Trust is a security framework that assumes all entities, both inside and outside the network, cannot be trusted and must be verified before gaining access to resources. Key Character
Question
A company plans to implement a research facility with intellectual property data that should be protected. The following is the security diagram proposed by the security architect: Which of the following security architect models is illustrated by the diagram?
Options
- AIdentity and access management model
- BAgent based security model
- CPerimeter protection security model
- DZero Trust security model
Explanation
The security diagram proposed by the security architect depicts a Zero Trust security model. Zero Trust is a security framework that assumes all entities, both inside and outside the network, cannot be trusted and must be verified before gaining access to resources. Key Characteristics of Zero Trust in the Diagram: Role-based Access Control: Ensures that users have access only to the resources necessary for Mandatory Access Control: Additional layer of security requiring authentication for access to sensitive areas. Network Access Control: Ensures that devices meet security standards before accessing the Multi-factor Authentication (MFA): Enhances security by requiring multiple forms of verification. This model aligns with the Zero Trust principles of never trusting and always verifying access requests, regardless of their origin.
Community Discussion
No community discussion yet for this question.