Notifications
Clear all
Topic starter
In which step of the Five-Step Methodology of Zero Trust are application access and user access defined?
- A . Step 4: Create the Zero Trust Policy
B. Step 3: Architect a Zero Trust Network
C. Step 1: Define the Protect Surface
D. Step 5: Monitor and Maintain the Network
Suggested Answer: A
Posted : 07/01/2023 3:24 am