Notifications
Clear all
Topic starter
In which step of the Five-Step Methodology for implementing the Zero Trust model does inspection and logging of all traffic take place?
- A . Step 4: Create the Zero Trust policy
B. Step 3: Architect a Zero Trust network
C. Step 1: Define the protect surface
D. Step 5: Monitor and maintain the network
Suggested Answer: D
Posted : 11/01/2023 2:30 am