Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.
A . It cannot identify command-and-control traffic.
B . It cannot monitor all potential network ports.
C . It assumes that all internal devices are untrusted.
D . It assumes that every internal endpoint can be trusted.
Answer: D
Latest PCCSA Dumps Valid Version with 50 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund