CCZT Online Practice Questions

Home / Cloud Security Alliance (CSA) / CCZT

Latest CCZT Exam Practice Questions

The practice questions for CCZT exam was last updated on 2025-06-03 .

Viewing page 1 out of 4 pages.

Viewing questions 1 out of 21 questions.

Question#1

Which ZT tenet is based on the notion that malicious actors reside inside and outside the network?

A. Assume breach
B. Assume a hostile environment
C. Scrutinize explicitly
D. Requiring continuous monitoring

Explanation:
The ZT tenet of assume breach is based on the notion that malicious actors reside inside and outside the network, and that any user, device, or service can be compromised at any time. Therefore, ZT requires continuous verification and validation of all entities and transactions, and does not rely on implicit trust or perimeter-based defenses

Question#2

How can we use ZT to ensure that only legitimate users can access a SaaS or PaaS? Select the best answer.

A. Implementing micro-segmentation and mutual Transport Layer Security (mTLS)
B. Configuring the security assertion markup language (SAML) service provider only to accept requests from the designated ZT gateway
C. Integrating behavior analysis and geofencing as part of ZT controls
D. Enforcing multi-factor authentication (MFA) and single-sign on (SSO)

Explanation:
(Configuring the security assertion markup language (SAML) service provider only to accept requests from the designated ZT gateway)
Configuring SAML to accept requests only from the designated ZT gateway ensures that all access requests are authenticated and authorized appropriately.
Reference = Zero Trust Architecture related sources including NIST

Question#3

What should an organization's data and asset classification be based on?

A. Location of data
B. History of data
C. Sensitivity of data
D. Recovery of data

Explanation:
Data and asset classification should be based on the sensitivity of data, which is the degree to which the data requires protection from unauthorized access, modification, or disclosure. Data sensitivity is determined by the potential impact of data loss, theft, or corruption on the organization, its customers, and its partners. Data sensitivity can also be influenced by legal, regulatory, and contractual obligations.
Reference =
Certificate of Competence in Zero Trust (CCZT) prepkit, page 10, section 2.1.1
Identify and protect sensitive business data with Zero Trust, section 1
Secure data with Zero Trust, section 1
SP 800-207, Zero Trust Architecture, page 9, section 3.2.1

Question#4

When kicking off ZT planning, what is the first step for an organization in defining priorities?

A. Determine current state
B. Define the scope
C. Define a business case
D. Identifying the data and assets

Explanation:
The first step for an organization in defining priorities for ZT planning is to determine the current state of its network, security, and business environment. This involves conducting a comprehensive assessment of the existing IT infrastructure, systems, applications, data, and assets, as well as the threats, risks, and vulnerabilities that affect them. The current state analysis also involves identifying the gaps, challenges, and opportunities for improvement in the current security posture, as well as the business goals, objectives, and requirements for ZT implementation12. By determining the current state, the organization can establish a baseline for measuring the progress and impact of ZT, as well as prioritize the most critical and urgent areas for ZT adoption.
Reference =
Planning for a Zero Trust Architecture: A Planning Guide for Federal Administrators | CSRC Publications NIST
Zero Trust Architecture Explained: A Step-by-Step Approach - Comparitech

Question#5

At which layer of the open systems interconnection (OSI) model does network access control (NAC) typically operate? Select the best answer.

A. Layer 6, the presentation layer
B. Layer 2, the data link layer
C. Layer 3, the network layer
D. Layer 4, the transport layer

Explanation:
Network access control (NAC) typically operates at layer 2, the data link layer, of the open systems interconnection (OSI) model. The data link layer is responsible for transferring data between adjacent nodes on a network, such as switches and endpoints. NAC operates at this layer by inspecting and controlling the access of devices to the network based on their MAC addresses, device profiles, security posture, and compliance status.
Reference = Certificate of Competence in Zero Trust (CCZT) - Cloud Security Alliance, Zero Trust Training (ZTT) - Module 6: Micro-segmentation

Exam Code: CCZTQ & A: 60 Q&AsUpdated:  2025-06-03

 Get All CCZT Q&As