ExamGecko
Question list
Search
Search

Related questions











Question 254 - 200-201 discussion

Report
Export

Which security model assumes an attacker within and outside of the network and enforces strict verification before connecting to any system or resource within the organization?

A.

Biba

Answers
A.

Biba

B.

Object-capability

Answers
B.

Object-capability

C.

Take-Grant

Answers
C.

Take-Grant

D.

Zero Trust

Answers
D.

Zero Trust

Suggested answer: D

Explanation:

The Zero Trust security model operates on the principle that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network. It emphasizes continuous monitoring, validation, and least-privilege access to minimize exposure to sensitive parts of the network.

asked 07/10/2024
D Chauhan
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first