You guys are overthinking this. It's clearly about creating the Zero Trust policy, so option A is the way to go. I mean, how else are you going to enforce the policy without inspecting and logging the traffic?
Hmm, I'm not convinced. Wouldn't the inspection and logging be part of defining the protect surface in the first step? That's what I'm going to go with, option C.
I'm not too sure about that. I was thinking that the inspection and logging of all traffic would happen during the network architecture phase, so I'm leaning towards option B.
This question seems to be testing our understanding of the Zero Trust model implementation steps. I think the key step here is monitoring and maintaining the network, so I'll go with option D.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Isidra
7 months agoNida
7 months agoIlene
6 months agoBarrie
6 months agoGerman
6 months agoAmber
6 months agoLuann
6 months agoEden
6 months agoSang
6 months agoMelvin
7 months agoVan
7 months ago