Isaca CRISC Question Answer
Which of the following shortcomings of perimeter security does Zero Trust aim to resolve?
Lack of access verification for systems on the internal network
Identification and authentication failures for users
Poorly configured firewall rules introducing security breaches
Ineffective load balancing on network devices
Zero Trustassumes that no system or user is inherently trustworthy—even within the internal network. It addresses theinadequacy of perimeter securityby enforcing continuous verification for every access request.
TESTED 11 Jul 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved