Which of the following are key considerations in the design of a data-centric Zero Trust model?
(Select two)
A . Classifying data based on sensitivity and value
B . Implementing a perimeter-based security model
C . Regularly auditing and updating data access policies
D . Ensuring physical security of all data centers only
Answer: AC
Latest D-ZT-DS-23 Dumps Valid Version with 150 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund