ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 163 - 400-007 discussion

Report
Export

A network security team observes phishing attacks on a user machine from a remote location. The organization has a policy of saving confidential data on two different systems using different types of authentication. What is the next step to control such events after the security team verifies all users in Zero Trust modeling?

A.

Enforce risk-based and adaptive access policies.

Answers
A.

Enforce risk-based and adaptive access policies.

B.

Assess real-time security health of devices.

Answers
B.

Assess real-time security health of devices.

C.

Apply a context-based network access control policy for users.

Answers
C.

Apply a context-based network access control policy for users.

D.

Ensure trustworthiness of devices.

Answers
D.

Ensure trustworthiness of devices.

Suggested answer: D
asked 10/10/2024
Gregory Pollack
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first