ECCouncil Related Exams
312-38 Exam
Which of the following security models enable strict identity verification for every user or device attempting to access the network resources?
1. Zero-trust network model
2. Castle-and-Moat model
Which of the following technologies can be used to leverage zero-trust model security?
Which of the following helps in viewing account activity and events for supported services made by AWS?