اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 378 من 427

كل الأسئلة

Eric, a cloud security engineer, deploys an architecture that assumes no user or device is trusted by default and verifies every connection, granting only the minimum access needed for each role. What technique is he using?

الخيارات

  • A Serverless computing
  • B Demilitarized zone (DMZ)
  • C Container technology
  • D Zero trust network

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.