Which statement best embodies trust-centric security?
A. Verify before granting access via identity-based policies for users, devices, apps, and locations
B. Prevent attacks via an intelligence-based policy, then detect, investigate, and remediate.
C. Verify before granting access via MDM software.
D. Protect users from attacks by enabling strict security policies.
Verify before granting access via identity-based policies for users, devices, apps, and locations
https://salesconnect.cloudapps.cisco.com/vid/index.html?cid=e02d6772-2e4b-4152-b99c-7aa75f995034
@3:30