GK Question

technology hard true_false

Zero Trust Architecture assumes that threats can exist both outside and inside the traditional network perimeter.

  1. True
  2. False

Answer: True

Zero Trust operates on 'never trust, always verify' principle. It eliminates implicit trust based on network location, requiring strict identity verification for every access request regardless of origin. Implements micro-segmentation, least-privilege access, continuous monitoring, and assumes breach mindset for robust security posture.

Topic Cybersecurity
Exam Relevance Banking, UPSC, SSC JE