
Ultimate access to all questions.
Discuss how you would design a Zero Trust security framework for an organization undergoing digital transformation, incorporating the Zero Trust Rapid Modernization Plan (RaMP). Consider the key principles of Zero Trust and how they can be applied to secure both legacy systems and new cloud-based applications.
A
Implement strict perimeter-based security and ignore internal segmentation.
B
Adopt a 'never trust, always verify' approach with continuous authentication and monitoring.
C
Use traditional firewall and VPN solutions without adapting to Zero Trust principles.
D
Rely solely on user credentials for access control without additional verification mechanisms.