Which security model assumes an attacker within and outside of the network and enforces strict verification before connecting to any system or resource within the organization?
A . Biba
B. Object-capability
C. Take-Grant
D. Zero Trust
Answer: D
Explanation:
Zero Trust security is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter.
Latest 200-201 Dumps Valid Version with 154 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund