‘Zero trust’ security Quiz

Authenticating users once is not enough anymore — its opens up too many doors, some of which should have never been unlocked in the first place. That’s why “zero trust” security was developed. Find out how much you know about using this high-level strategy to enhance security.

Earn free CEUs — visit our Continuing Education Center today!

1. What is the core principle of zero trust security?
A. Trust when verified
B. Verify but don't trust
C. Trust but always verify
D. Trusted security is verified
2. Zero trust security was developed by which organization?
A. National Security Agency (NSA)
B. National Institute of Standards and Technology (NIST)
C. Massachusetts Institute of Technology (MIT)
D. Department of Homeland Security (DHS)
3. In a zero trust in environment, what is considered untrusted by default?
A. Everything
B. Nothing
C. Only external devices
D. Only employees
4. The four pillars of zero trust include the following except:
A. Network segmentation
B. Continuous monitoring
C. Device trust
D. Password security
5. What is the primary goal of micro-segmentation?
A. To divide a network into smaller, isolated segments
B. To remove all network segments
C. To create a single, large network segment
D. To secure external connections
6. What does the principle of least privilege mean?
A. Give every user full access
B. Limit access to the bare minimum required
C. Always trust privileged users
D. Grant access based on job titles
7. _____ is a key benefit of zero trust security.
A. Lower implementation costs
B. Enhanced user experience
C. Improved threat visibility
D. Simplified network architecture
8. What role does identity and access management (IAM) play in zero trust?
A. To trust all user identities
B. To eliminate user authentication
C. To control and manage user access
D. To provide open access to all users
9. How do users authenticate in zero trust environments?
A. Single-factor authentication
B. Multifactor authentication (MFA)
C. No authentication required
D. Use of shared passwords
10. What is the purpose of continuous monitoring and analytics?
A. To monitor employee activities
B. To provide real-time updates on the network
C. To detect and respond to security threatse
D. To assess employee performance
Thank you!
Your score is
Test your knowledge!! Take Another Quiz Here