Option C is the way to go. Can't have ZTA without proper authentication and access control for third-party users and devices. Anything less is just an open invitation for trouble.
Educating users is important, but it's not enough on its own. ZTA policies need to have robust authentication mechanisms to verify the identity and context of third-party access.
B: ZTA policies should primarily educate users about secure practices and promote strong authentication for services accessed via mobile devices to prevent data compromise.
A: ZTA policies can be configured to authenticate third-party users and their devices, determining the necessary access privileges for resources while concealing all other assets to minimize the attack surface.
Securing remote users through VDI and cloud workstations is a good idea, but it doesn't address the specific question of how to authenticate third-party users and devices.
C) ZTA policies can be configured to authenticate third-party users and their devices, determining the necessary access privileges for resources while concealing all other assets to minimize the attack surface.
A) ZTA policies can implement robust encryption and secure access controls to prevent access to services from stolen devices, ensuring that only legitimate users can access mobile services.
I think option C is the best choice. ZTA policies can authenticate third-party users and devices while concealing other assets to minimize the attack surface.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Yaeko
9 days agoRasheeda
10 days agoGabriele
12 days agoJuliana
15 days agoLashawn
2 days agoLauna
5 days agoScot
21 days agoVeronique
24 hours agoFranchesca
9 days agoWillard
28 days agoClaudia
18 days agoCatherin
19 days agoLillian
24 days agoHermila
1 months agoIsaiah
1 months ago