A. The key is what principles share between CIA and ZTN. Only 2FA authentication is example of ZTN principles. All others - encryption, categorization, and high availability are not.
Zero Trust focused on Identity, Authentication, and Authorization. If we map it to the CIA triad, confidentiality, and integrity are what Zero trust is.
Maybe consider C?
Options A and D mention encryption requirements, which are important for protecting data confidentiality but are not specific to the priority of a Zero Trust network.
Option B mentions the categorization of systems and data based on privacy needs, which is an important consideration but not the top priority when implementing a Zero Trust network.
It must be "Ensuring that authorized users have high-availability system access from defined zones to defined systems or zones"
CIA dictates for HA.
upvoted 3 times
...
This section is not available anymore. Please use the main Exam Page.400-007 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
sandccie
2 months agoThe1BelowAll
3 months, 4 weeks agoanonymousch
6 months agopAmela84
3 months, 3 weeks agore_j0hn
1 year, 9 months agoJ_W
1 year, 10 months agobdp123
1 year, 11 months agoATRRHMN
1 year, 11 months ago