Which identity based Zero Trust implementation step decides the necessary level of protection for each resource?

Which identity based Zero Trust implementation step decides the necessary level of protection for each resource?
A . Monitor
B . Recover
C . Classify
D . Adapt

Answer: C

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments