Which of the following are key components in the design of an identity-based Zero Trust system?
Which of the following are key components in the design of an identity-based Zero Trust system?
(Select two)
A . Continuous validation of user identity and privileges
B . Static access permissions that do not change over time
C . Role-based access control with periodic reviews
D . A single-layer authentication mechanism
Answer: AC
Latest D-ZT-DS-23 Dumps Valid Version with 150 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments