Techvault Academy

🛡️ CompTIA A+ Core 2 🛡️
A company is implementing a "Zero Trust" security model. A technician is configuring access to a sensitive file server. Which of the following actions BEST aligns with the principles of a Zero Trust model?

3 weeks ago | [YT] | 33



@jeanmarc4956

this was a good question... remember zero trust policy assume that the threat is already inside the network... so everyone still has to authenticate! and also it was easy beacuse i have my a+ lol

3 weeks ago | 0