Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 80 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 80
Topic #: 1
[All 312-50v12 Questions]

Eric, a cloud security engineer, implements a technique for securing the cloud resources used by his organization. This technique assumes by default that a user attempting to access the network is not an authentic entity and verifies every incoming connection before allowing access to the network. Using this technique, he also imposed conditions such that employees can access only the resources required for their role.
What is the technique employed by Eric to secure cloud resources?

  • A. Demilitarized zone
  • B. Zero trust network
  • C. Serverless computing
  • D. Container technology
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
insaniunt
11 months ago
Selected Answer: B
B. Zero trust network
upvoted 2 times
chouchouam
10 months, 2 weeks ago
hello i hope ure doing well did you pass the exam or not yet
upvoted 1 times
...
...
581777a
1 year, 3 months ago
Selected Answer: B
B. Zero trust network
upvoted 2 times
...
Vincent_Lu
1 year, 5 months ago
B. Zero trust network
upvoted 4 times
...
eli117
1 year, 7 months ago
Selected Answer: B
A zero trust network is a security model that assumes that every user, device, and application attempting to access the network is a potential threat, regardless of whether they are inside or outside the network perimeter. It verifies every incoming connection before allowing access to the network and imposes strict conditions such as least privilege access, microsegmentation, and continuous monitoring. In the given scenario, Eric implemented a technique for securing the cloud resources used by his organization that assumes by default that a user attempting to access the network is not an authentic entity and verifies every incoming connection before allowing access to the network. He also imposed conditions such that employees can access only the resources required for their role. This is a typical example of the zero trust security model, which is designed to prevent unauthorized access to network resources and protect against potential security breaches.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...