You guys are overthinking this. It's clearly about creating the Zero Trust policy, so option A is the way to go. I mean, how else are you going to enforce the policy without inspecting and logging the traffic?
Hmm, I'm not convinced. Wouldn't the inspection and logging be part of defining the protect surface in the first step? That's what I'm going to go with, option C.
I'm not too sure about that. I was thinking that the inspection and logging of all traffic would happen during the network architecture phase, so I'm leaning towards option B.
This question seems to be testing our understanding of the Zero Trust model implementation steps. I think the key step here is monitoring and maintaining the network, so I'll go with option D.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Isidra
11 months agoNida
11 months agoIlene
10 months agoBarrie
10 months agoGerman
10 months agoAmber
10 months agoLuann
10 months agoEden
10 months agoSang
10 months agoMelvin
11 months agoVan
11 months ago