Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.

Posted by: Pdfprep Category: PCCSA Tags: , ,

Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.
A . It cannot identify command-and-control traffic.
B . It cannot monitor all potential network ports.
C . It assumes that all internal devices are untrusted.
D . It assumes that every internal endpoint can be trusted.

Answer: D

Leave a Reply

Your email address will not be published.