What are two steps customers can take to evolve to a trust-centric security philosophy?

What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)
A. Block BYOD devices
B. Always verify and never trust everything inside and outside the perimeter.
C. Limit internal access to networks.
D. Only grant access to authorized users and devices.
E. Require and install agents on mobile devices.

cisco-exams

One thought on “What are two steps customers can take to evolve to a trust-centric security philosophy?

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.