List of questions
Related questions
Question 86 - PCCET discussion
Identify a weakness of a perimeter-based network security strategy to protect an organization's endpoint systems.
A.
It cannot identify command-and-control traffic
B.
It assumes that all internal devices are untrusted
C.
It assumes that every internal endpoint can be trusted
D.
It cannot monitor all potential network ports
Your answer:
0 comments
Sorted by
Leave a comment first