Skip to main content

A company is implementing a Zero Trust security strategy. Which principle requires that organizations verify every request as though it originates from an untrusted network, using all available data points such as user identity, location, device health, and the resource being accessed?

This is a free preview. Create an account to access all 340 questions.