Which of the following is the MOST important factor in successfully implementing Zero Trust?
A.
Preferring networks that have undergone penetration testing
B.
Focusing on logging and monitoring of user behavior
C.
Authenticating and authorizing strategic points of the architecture
D.
Understanding each component of the network
The Answer Is:
C
This question includes an explanation.
Explanation:
Zero Trust requires granular authentication and authorization at every critical juncture. It assumes no implicit trust within the network and enforces strict access control.
“Zero Trust is based on continuous authentication and authorization at all strategic control points.”