I practiced a question similar to this, and I think multi-factor authentication is a key component, but I can't remember if it's paired with micro-segmenting or something else.
I'm leaning towards C. Controlling access and segmenting the network seem fundamental to establishing that "never trust, always verify" principle of Zero Trust.
Hmm, I'm not totally sure about this one. I know Zero Trust is about not trusting anything by default, but I'm not confident which of these options best captures that approach.
Shenika
3 hours agoDerick
5 days agoTheresia
10 days agoNana
16 days agoRenea
21 days agoJamey
26 days agoVal
1 month agoElliott
1 month agoRoselle
2 months agoLashawna
2 months agoSantos
2 months agoAlline
2 months agoRasheeda
3 months agoDeja
3 months agoElvis
3 months agoPenney
3 months agoJamie
3 months agoOdette
3 months agoArlene
4 months agoShawnda
4 months agoShaunna
4 months agoCarmelina
5 months agoColene
5 months agoElli
5 months agoAsuncion
4 months agoTheresia
4 months agoHerminia
5 months ago