🛡️ CompTIA A+ Core 2 🛡️ A company is implementing a "Zero Trust" security model. A technician is configuring access to a sensitive file server. Which of the following actions BEST aligns with the principles of a Zero Trust model?
this was a good question... remember zero trust policy assume that the threat is already inside the network... so everyone still has to authenticate! and also it was easy beacuse i have my a+ lol
Techvault Academy
🛡️ CompTIA A+ Core 2 🛡️
A company is implementing a "Zero Trust" security model. A technician is configuring access to a sensitive file server. Which of the following actions BEST aligns with the principles of a Zero Trust model?
3 weeks ago | [YT] | 33