List of questions
Related questions
Question 279 - 350-701 discussion
An organization wants to secure data in a cloud environment. Its security model requires that all users be authenticated and authorized. Security configuration and posture must be continuously validated before access is granted or maintained to applications and dat a. There is also a need to allow certain application traffic and deny all other traffic by default. Which technology must be used to implement these requirements?
A.
Virtual routing and forwarding
B.
Microsegmentation
C.
Access control policy
D.
Virtual LAN
Your answer:
0 comments
Sorted by
Leave a comment first