I'm going with C. It just makes the most sense to me. Step 4 is all about establishing the policies that enforce Zero Trust, including user and application access controls.
I was leaning towards D. Step 1: Define the Protect Surface, but now I'm not so sure. Doesn't that step focus more on identifying the critical assets to protect?
Hmm, I think the correct answer is C. Step 4: Create the Zero Trust Policy. That's where you define the access controls and policies for users and applications, right?
Solange
30 days agoKathrine
11 days agoJustine
21 days agoOren
2 months agoMelda
2 months agoJulio
1 months agoCarey
1 months agoJerilyn
2 months agoAbel
2 months agoPortia
22 days agoDana
23 days agoLeota
24 days agoBulah
29 days agoRosio
2 months agoMelynda
2 months ago