Zero Trust focused on Identity, Authentication, and Authorization. If we map it to the CIA triad, confidentiality, and integrity are what Zero trust is.
Maybe consider C?
Options A and D mention encryption requirements, which are important for protecting data confidentiality but are not specific to the priority of a Zero Trust network.
Option B mentions the categorization of systems and data based on privacy needs, which is an important consideration but not the top priority when implementing a Zero Trust network.
It must be "Ensuring that authorized users have high-availability system access from defined zones to defined systems or zones"
CIA dictates for HA.
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
The1BelowAll
3 weeks, 2 days agoanonymousch
2 months, 3 weeks agopAmela84
3 weeks, 1 day agore_j0hn
1 year, 6 months agoJ_W
1 year, 7 months agobdp123
1 year, 8 months agoATRRHMN
1 year, 8 months ago