Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.

Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.
A . It cannot identify command-and-control traffic.
B . It cannot monitor all potential network ports.
C . It assumes that all internal devices are untrusted.
D . It assumes that every internal endpoint can be trusted.

Answer: D

Latest PCCSA Dumps Valid Version with 50 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments