What are the two validation methods used to validate user authenticity in Zero Trust architecture?

What are the two validation methods used to validate user authenticity in Zero Trust architecture?

(Select 2)
A . Virtual private network segmentation
B . Demilitarized zones authentication
C . Machine user authentication
D . User identity authentication

Answer: CD

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments