Which cybersecurity approach presumes no trusted connections and uses continuous verification?

Prepare for the Air Force Cybersecurity Test. Use flashcards and multiple-choice questions with detailed explanations and hints. Ensure success on your exam with tailored study material!

Multiple Choice

Which cybersecurity approach presumes no trusted connections and uses continuous verification?

Explanation:
Zero Trust treats every access attempt as untrusted and requires continuous verification of who is requesting, from what device, in what context, and with what level of access. Access is granted only through strict least-privilege policies and can be re-verified at multiple points during a session, supported by strong identity management, device health checks, encryption, micro-segmentation, and ongoing monitoring to catch anomalies. This continuous verification and lack of implicit trust across the network best fit the description in the question. Perimeter security relies on a trusted internal network behind a defended boundary, which contradicts the idea of never trusting connections; defense in depth adds multiple protective layers but doesn't inherently mandate continuous, per-access verification; and the boundary model focuses on network edges rather than enforcing trust at every access attempt.

Zero Trust treats every access attempt as untrusted and requires continuous verification of who is requesting, from what device, in what context, and with what level of access. Access is granted only through strict least-privilege policies and can be re-verified at multiple points during a session, supported by strong identity management, device health checks, encryption, micro-segmentation, and ongoing monitoring to catch anomalies. This continuous verification and lack of implicit trust across the network best fit the description in the question. Perimeter security relies on a trusted internal network behind a defended boundary, which contradicts the idea of never trusting connections; defense in depth adds multiple protective layers but doesn't inherently mandate continuous, per-access verification; and the boundary model focuses on network edges rather than enforcing trust at every access attempt.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy