Exam4Training

Which identity based Zero Trust implementation step decides the necessary level of protection for each resource?

Which identity based Zero Trust implementation step decides the necessary level of protection for each resource?
A . Monitor
B . Recover
C . Classify
D . Adapt

Answer: C

Exit mobile version