IT Certification Exams

Identify a weakness of a perimeter-based network security strategy to protect an organization’s en

Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.

A. It cannot identify command-and-control traffic.
B. It cannot monitor all potential network ports.
C. It assumes that all internal devices are untrusted.

D. It assumes that every internal endpoint can be trusted.