Cisco 700-760 Question Answer
Which statement embodies trust-centric security?
Verify before granting access via MDM software
Prevent attacks via an intelligence-based policy, then detect, investigate, and remediate
Protect users from attacks by enabling strict security policies.
Verify before granting access via identity-based policies for users, devices, apps. and locations
TESTED 11 Jul 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved