Which option supports the use of Extended Detection and Responses in Zero Trust Network Access?

Which option supports the use of Extended Detection and Responses in Zero Trust Network Access?
A . Centralized management
B . Layered security approach
C . Continuous verification and validation
D . Identity and Access Management

Answer: D

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments