List of questions
Related questions
Question 484 - 312-38 discussion
Which of the follow ng security models enable strict identity verification for every user or device attempting to access the network resources?
A.
Zero-trust network model II. Castle-and-Moat model
B.
Both I and II
C.
I only
D.
II only
E.
None
Your answer:
0 comments
Sorted by
Leave a comment first