Which statement best embodies trust-centric security?

Posted by: Pdfprep Category: 700-765 Tags: , ,

Which statement best embodies trust-centric security?
A . Protect users from attacks by enabling strict security policies.
B . Verify before granting access via identity-based policies for users, devices, apps, and locations.
C . Verify before granting access via MDM software.
D . Prevent attacks via an intelligence-based policy, then detect, investigate, and remediate.

Answer: B

Leave a Reply

Your email address will not be published.