The correct answer is C. In Zero Trust architecture, policy enforcement exists to provide precise, least-privileged access. It is not designed to place a user broadly onto the network, and it is not limited to simply blocking everything. Instead, it enables granular access from the verified initiator to the specific verified application, while also applying the correct policy conditions related to risk, content inspection, and business requirements.
This is one of the central differences between Zero Trust and legacy security models. Traditional VPN and firewall architectures often grant broad network connectivity first and then attempt to restrict behavior afterward. Zero Trust reverses that logic. The user is not trusted because they reached the network. Instead, the user receives access only to the exact application or service that policy permits, and only under the validated conditions for that request.
That is why granular policy enforcement is so important. It reduces attack surface, limits lateral movement, and aligns access with identity, context, and content-aware controls. Therefore, the best answer is granular access from the verified initiator only to the verified application, under the correct risk and content controls.