Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

SANS SEC530 Defensible Security Architecture and Engineering Study Guide Updated 2026/2027 Syllabus | 100+ Exam Questions with Answers

Beoordeling
-
Verkocht
-
Pagina's
41
Cijfer
A+
Geüpload op
22-04-2026
Geschreven in
2025/2026

SANS SEC530 Defensible Security Architecture and Engineering Study Guide Updated 2026/2027 Syllabus | 100+ Exam Questions with Answers This study guide covers all core domains of the SANS SEC530 certification exam, including Zero Trust Architecture, threat modeling, network security hardening, application security, data protection, and security monitoring. Each question is followed by ANSWER as requested. Domain 1: Zero Trust Architecture & Core Principles Q1: An organization is moving away from a traditional perimeter-based security model. Which statement best encapsulates the foundational assumption of a Zero Trust Architecture (ZTA)? A) The internal network is a safe zone, and external connections are the primary threat. B) Trust is established solely by the user's IP address being within the corporate range. C) The network is always considered hostile, and access to any resource must be continuously verified. D) A strong VPN is sufficient to secure all remote and internal traffic. ANSWER C) The network is always considered hostile, and access to any resource must be continuously verified. Rationale: ZTA is built on the principle of "never trust, always verify." It assumes the network is always hostile, whether internal or external, and requires continuous verification of identity, device health, and context for every access request . Q2: A security architect is implementing micro-segmentation within a data center. What is the primary security goal this control achieves? A) It increases network throughput by isolating broadcast domains. B) It prevents lateral movement by restricting an attacker's ability to pivot from a compromised host to others. C) It simplifies firewall rule management by consolidating all servers into a single zone. D) It replaces the need for host-based firewalls on critical assets. ANSWER B) It prevents lateral movement by restricting an attacker's ability to pivot from a compromised host to others. Rationale: Micro-segmentation creates granular security zones for individual workloads or groups of assets. Its main defensive purpose is to contain breaches by limiting an attacker's ability to move laterally (east-west traffic) within the network after an initial compromise . Q3: In a Zero Trust model, a Software-Defined Perimeter (SDP) is used to: A) Replace the physical network infrastructure with a virtual one. B) Make applications and infrastructure invisible to unauthorized users by requiring device attestation and authentication before granting network access. C) Provide a faster alternative to IPsec VPNs without any security trade-offs. D) Automatically patch all internet-facing servers. ANSWER B) Make applications and infrastructure invisible to unauthorized users by requiring device attestation and authentication before granting network access. Rationale: An SDP creates an identity- and context-based perimeter around assets. It hides network resources from unauthorized discovery and only allows access after a device and user have been verified, effectively creating a "dark cloud" . Q4: When discussing the DISA Zero Trust pillars, which pillar encompasses controls like Local Admin Password Solution (LAPS) to manage privileged access on endpoints? A) Data B) Network/Environment

Meer zien Lees minder
Instelling
SANS SEC530 Defensible Security Architecture
Vak
SANS SEC530 Defensible Security Architecture

Voorbeeld van de inhoud

SANS SEC530 Defensible Security Architecture and
Engineering Study Guide

Updated 2026/2027 Syllabus | 100+ Exam Questions with
Answers
This study guide covers all core domains of the SANS SEC530 certification exam,
including Zero Trust Architecture, threat modeling, network security hardening,
application security, data protection, and security monitoring. Each question is followed
by ANSWER ✓ as requested.




Domain 1: Zero Trust Architecture & Core Principles
Q1: An organization is moving away from a traditional perimeter-based security
model. Which statement best encapsulates the foundational assumption of a Zero
Trust Architecture (ZTA)?

A) The internal network is a safe zone, and external connections are the primary threat.
B) Trust is established solely by the user's IP address being within the corporate range.
C) The network is always considered hostile, and access to any resource must be
continuously verified.
D) A strong VPN is sufficient to secure all remote and internal traffic.

ANSWER ✓ C) The network is always considered hostile, and access to any resource
must be continuously verified.

Rationale: ZTA is built on the principle of "never trust, always verify." It assumes the
network is always hostile, whether internal or external, and requires continuous
verification of identity, device health, and context for every access request .




Q2: A security architect is implementing micro-segmentation within a data center.
What is the primary security goal this control achieves?

,A) It increases network throughput by isolating broadcast domains.
B) It prevents lateral movement by restricting an attacker's ability to pivot from a
compromised host to others.
C) It simplifies firewall rule management by consolidating all servers into a single zone.
D) It replaces the need for host-based firewalls on critical assets.

ANSWER ✓ B) It prevents lateral movement by restricting an attacker's ability to pivot
from a compromised host to others.

Rationale: Micro-segmentation creates granular security zones for individual workloads or
groups of assets. Its main defensive purpose is to contain breaches by limiting an
attacker's ability to move laterally (east-west traffic) within the network after an initial
compromise .




Q3: In a Zero Trust model, a Software-Defined Perimeter (SDP) is used to:

A) Replace the physical network infrastructure with a virtual one.
B) Make applications and infrastructure invisible to unauthorized users by requiring
device attestation and authentication before granting network access.
C) Provide a faster alternative to IPsec VPNs without any security trade-offs.
D) Automatically patch all internet-facing servers.

ANSWER ✓ B) Make applications and infrastructure invisible to unauthorized users by
requiring device attestation and authentication before granting network access.

Rationale: An SDP creates an identity- and context-based perimeter around assets. It hides
network resources from unauthorized discovery and only allows access after a device and
user have been verified, effectively creating a "dark cloud" .




Q4: When discussing the DISA Zero Trust pillars, which pillar encompasses controls
like Local Admin Password Solution (LAPS) to manage privileged access on
endpoints?

A) Data
B) Network/Environment

,C) User
D) Device

ANSWER ✓ D) Device

Rationale: The Device pillar in DISA's Zero Trust framework includes endpoint hardening,
configuration management, and privileged access management controls such as LAPS .




Q5: What is the centralized control component of Zero Trust architecture called?

A) Data plane
B) Control plane
C) Management plane
D) Security plane

ANSWER ✓ B) Control plane

Rationale: In a zero trust architecture, the control plane manages centralized decisions
regarding access, authentication, and policy enforcement. It is responsible for verifying
trust continuously before granting access, while the data plane handles actual traffic flow .




Q6: Which of the following is NOT a DISA Zero Trust pillar?

A) User
B) Device
C) Perimeter Gateway
D) Data

ANSWER ✓ C) Perimeter Gateway

Rationale: The DISA Zero Trust pillars are: User, Device, Network/Environment,
Applications and Workloads, Data, Visibility and Analytics, and Automation and
Orchestration. Traditional perimeter concepts like "Perimeter Gateway" are not pillars in
Zero Trust architecture .

, Q7: According to Zero Trust principles, what must be true about all traffic?

A) All traffic must be allowed for business continuity.
B) All traffic must be inspected and secured.
C) Only inbound traffic requires inspection.
D) Only traffic crossing the perimeter needs encryption.

ANSWER ✓ B) All traffic must be inspected and secured.

Rationale: Zero Trust mandates that all traffic must be secured regardless of origin or
destination. This includes east-west traffic within the data center and internal network
traffic, not just north-south perimeter traffic .




Q8: What is "variable trust" in the context of Zero Trust architecture?

A) Trust levels that change based on user mood.
B) Access controlled by a dynamic scoring system similar to credit scores, evaluating
multiple factors.
C) Trust that decreases over time without reason.
D) A binary trust decision (trusted or untrusted).

ANSWER ✓ B) Access controlled by a dynamic scoring system similar to credit scores,
evaluating multiple factors.

Rationale: Variable trust means access decisions are based on a continuous evaluation of
multiple factors including user identity, device health, location, behavior, and other
contextual data—not a simple binary trusted/untrusted decision .




Q9: What does "trust over time" refer to in Zero Trust?

A) Trust increases as a user stays longer in the organization.
B) The longer a machine or user is in production, the more likely it is compromised or
deviates from baseline.
C) Trust is established once and remains forever.
D) Time-based one-time passwords for authentication.

Geschreven voor

Instelling
SANS SEC530 Defensible Security Architecture
Vak
SANS SEC530 Defensible Security Architecture

Documentinformatie

Geüpload op
22 april 2026
Aantal pagina's
41
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$14.19
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
SmartscoreAaron Chicago State University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
77
Lid sinds
1 jaar
Aantal volgers
6
Documenten
4035
Laatst verkocht
1 week geleden
SMARTSCORES LIBRARY

Get top-tier academic support for Psychology, Nursing, Business, Engineering, HRM, Math, and more. Our team of professional tutors delivers high-quality homework, quiz, and exam assistance—ensuring scholarly excellence and grade-boosting results. Trust our collaborative expertise to help you succeed in any course at U.S.A Institutions.

3.1

7 beoordelingen

5
3
4
1
3
0
2
0
1
3

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen