Q: 13
A network security team observes phishing attacks on a user machine from a remote location. The
organization has a policy of saving confidential data on two different systems using different types of
authentication. What is the next step to control such events after the security team verifies all users
in Zero Trust modeling?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.