Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cloud Security Alliance CCZT Practice Exam with Questions & Answers | Set: 2

Questions 11

Which component in a ZTA is responsible for deciding whether to

grant access to a resource?

Options:
A.

The policy enforcement point (PEP)

B.

The policy administrator (PA)

C.

The policy engine (PE)

D.

The policy component

Cloud Security Alliance CCZT Premium Access
Questions 12

Which of the following is a required concept of single packet

authorizations (SPAs)?

Options:
A.

An SPA packet must be digitally signed and authenticated.

B.

An SPA packet must self-contain all necessary information.

C.

An SPA header is encrypted and thus trustworthy.

D.

Upon receiving an SPA, a server must respond to establish secure

connectivity.

Questions 13

Which activity of the ZT implementation preparation phase ensures

the resiliency of the organization's operations in the event of

disruption?

Options:
A.

Change management process

B.

Business continuity and disaster recovery

C.

Visibility and analytics

D.

Compliance

Questions 14

According to NIST, what are the key mechanisms for defining,

managing, and enforcing policies in a ZTA?

Options:
A.

Policy decision point (PDP), policy enforcement point (PEP), and

policy information point (PIP)

B.

Data access policy, public key infrastructure (PKI), and identity and

access management (IAM)

C.

Control plane, data plane, and application plane

D.

Policy engine (PE), policy administrator (PA), and policy broker (PB)

Questions 15

At which layer of the open systems interconnection (OSI) model

does network access control (NAC) typically operate? Select the

best answer.

Options:
A.

Layer 6, the presentation layer

B.

Layer 2, the data link layer

C.

Layer 3, the network layer

D.

Layer 4, the transport layer

Questions 16

Which security tools or capabilities can be utilized to automate the

response to security events and incidents?

Options:
A.

Single packet authorization (SPA)

B.

Security orchestration, automation, and response (SOAR)

C.

Multi-factor authentication (MFA)

D.

Security information and event management (SIEM)

Questions 17

Scenario: A multinational org uses ZTA to enhance security. They

collaborate with third-party service providers for remote access to

specific resources. How can ZTA policies authenticate third-party

users and devices for accessing resources?

Options:
A.

ZTA policies can implement robust encryption and secure access

controls to prevent access to services from stolen devices, ensuring

that only legitimate users can access mobile services.

B.

ZTA policies should prioritize securing remote users through

technologies like virtual desktop infrastructure (VDI) and corporate

cloud workstation resources to reduce the risk of lateral movement via

compromised access controls.

C.

ZTA policies can be configured to authenticate third-party users

and their devices, determining the necessary access privileges for

resources while concealing all other assets to minimize the attack

surface.

D.

ZTA policies should primarily educate users about secure practices

and promote strong authentication for services accessed via mobile

devices to prevent data compromise.

Questions 18

Scenario: An organization is conducting a gap analysis as a part of

its ZT planning. During which of the following steps will risk

appetite be defined?

Options:
A.

Create a roadmap

B.

Determine the target state

C.

Determine the current state

D.

Define requirements

Exam Code: CCZT
Certification Provider: Cloud Security Alliance
Exam Name: Certificate of Competence in Zero Trust (CCZT)
Last Update: Jul 17, 2025
Questions: 60

Cloud Security Alliance Related Exams

Cloud Security Alliance Free Exams

Cloud Security Alliance Free Exams
Elevate your Cloud Security Alliance exam preparation with free access to high-quality resources at Examstrack.