This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
What is the core principle of Zero Trust security?
Assume everything inside the network is safe
Assume nothing inside or outside the network is safe and verify every access request
Allow all access requests by default
Only allow access requests from trusted sources
What does the Zero Trust Rapid Modernization Plan (RaMP) aim to do?
Rapidly migrate all network traffic to a Zero Trust architecture
Provide a structured approach to implement Zero Trust principles in phases
Implement a single Zero Trust solution for all security needs
Reduce the number of security controls to simplify the security architecture
What is the purpose of the Secure Data with Zero Trust initiative?
To ensure data is encrypted at rest and in transit
To implement a secure data center
To protect data through data classification, access controls, and auditing
What is the role of automation and orchestration in implementing Zero Trust security?
To replace human decision-making and intervention
To increase the complexity of security processes
To streamline security processes and enable faster response times
To replace all security tools with automated solutions
You must answer all questions before checking your work.
Was this page helpful?