PrepAway - Latest Free Exam Questions & Answers

Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint sys

Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.

A. It cannot identify command-and-control traffic.
B. It cannot monitor all potential network ports.
C. It assumes that all internal devices are untrusted.

D. It assumes that every internal endpoint can be trusted.


Leave a Reply

Your email address will not be published. Required fields are marked *