I feel like it’s definitely not Step 5 since that’s more about monitoring. I’m torn between Step 4 and Step 3, though. I wish I had reviewed this more!
I remember practicing a question about the Zero Trust methodology, and I think it was Step 3 where we talked about network architecture. But defining access seems more like a policy thing.
I remember learning that application and user access are key components of the Zero Trust policy, so I'm going to go with Step 4 on this one. Gotta be sure to read the question carefully, though.
Ah, this is a tricky one. I'm leaning towards Step 3, since that's where the network is architected, which would include defining access policies. But I could see an argument for Step 4 as well.
Step 4 seems like the most logical choice here. That's where the actual Zero Trust policy is created, which would naturally include the access controls for applications and users.
Beatriz
3 months agoDavida
3 months agoTu
3 months agoCory
4 months agoWillodean
4 months agoLenna
4 months agoWenona
4 months agoAyesha
4 months agoRozella
5 months agoAlmeta
5 months agoEugene
5 months agoOlive
5 months agoKris
5 months agoMireya
5 months agoDorothy
5 months agoAlyce
5 months agoMicaela
9 months agoFletcher
8 months agoCharlene
8 months agoGracia
8 months agoMargart
8 months agoTawna
10 months agoShoshana
8 months agoLeonora
8 months agoLisha
8 months agoHillary
8 months agoKristel
8 months agoWillie
10 months agoBernardo
10 months agoMarge
9 months agoBeckie
9 months agoIrma
9 months agoTenesha
10 months agoDaren
9 months agoLyda
9 months agoLorriane
10 months agoCoral
11 months agoJoanna
11 months agoCoral
11 months ago