Isaca CRISC Question Answer
Which of the following shortcomings of perimeter security does Zero Trust aim to resolve?
Lack of access verification for systems on the internal network
Identification and authentication failures for users
Poorly configured firewall rules introducing security breaches
Ineffective load balancing on network devices
Zero Trustassumes that no system or user is inherently trustworthy—even within the internal network. It addresses theinadequacy of perimeter securityby enforcing continuous verification for every access request.
TESTED 18 Jan 2026
Copyright © 2014-2026 ACE4Sure. All Rights Reserved