Highly dependent on the network type, including whether that network is IPv4 or IPv6.
C.
Based purely on a network appliance, constrained by how much CPU may be available.
D.
Hairpinned through service chaining by an SD-WAN appliance.
The Answer Is:
A
This question includes an explanation.
Explanation:
The correct answer is A . By definition, Zero Trust connections are independent of the network for control or trust . This is one of the most important distinctions between Zero Trust and legacy security models. In traditional architectures, trust is often inherited from network location. If a user is on the corporate network, or connected into it by VPN, that user may gain broad access based on network reachability. Zero Trust rejects that model. Instead, trust is established through identity, posture, context, and policy for each access request.
Because of this, the underlying transport network becomes less important from a trust perspective. Whether the user is on Wi-Fi, broadband, mobile internet, IPv4, or IPv6 is not the defining factor in the access decision. The connection can operate over many types of networks, but the network itself is not what grants trust . Options B, C, and D all describe legacy or infrastructure-specific dependencies that Zero Trust is designed to avoid. A Zero Trust connection is therefore defined by policy-controlled, context-aware access , not by dependence on a particular network type or appliance path.
ZTCA PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 65% Discount on All Products,
Use Coupon: "ac4s65"