What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)
A. Block BYOD devices
B. Always verify and never trust everything inside and outside the perimeter.
C. Limit internal access to networks.
D. Only grant access to authorized users and devices.
E. Require and install agents on mobile devices.
B & D
https://salesconnect.cloudapps.cisco.com/vid/index.html?cid=e02d6772-2e4b-4152-b99c-7aa75f995034 @3:16