I'm going with C. It just makes the most sense to me. Step 4 is all about establishing the policies that enforce Zero Trust, including user and application access controls.
I was leaning towards D. Step 1: Define the Protect Surface, but now I'm not so sure. Doesn't that step focus more on identifying the critical assets to protect?
Hmm, I think the correct answer is C. Step 4: Create the Zero Trust Policy. That's where you define the access controls and policies for users and applications, right?
Solange
2 months agoEmily
16 days agoKathrine
1 months agoJustine
1 months agoOren
2 months agoMelda
2 months agoJulio
2 months agoCarey
2 months agoJerilyn
2 months agoAbel
3 months agoPortia
1 months agoDana
1 months agoLeota
1 months agoBulah
2 months agoRosio
3 months agoMelynda
3 months ago