Correct Answer:
A
According to NIST, the key mechanisms for defining, managing, and enforcing policies in a ZTA are
the policy decision point (PDP), the policy enforcement point (PEP), and the policy information point
(PIP). The PDP is the component that evaluates the policies and the contextual data collected from
various sources and generates an access decision. The PEP is the component that enforces the access
decision on the resource. The PIP is the component that provides the contextual data to the PDP,
such as the user identity, the device posture, the network location, the resource attributes, and the
environmental factors.
Reference=
Zero Trust Architecture Project - NIST Computer Security Resource Center, slide 9
What Is Zero Trust Architecture (ZTA)? - F5, section “Policy Engine”
Zero Trust Frameworks Architecture Guide - Cisco, page 4, section “Policy Decision Point”