Skip to main content

A security engineer is designing a network access strategy for a financial institution. The CISO requires that no user or device is inherently trusted, even if they are already inside the corporate network. Which core principle best describes this requirement?

This is a free preview. Create an account to access all 340 questions.