Ultimate access to all questions.
Upgrade Now 🚀
Sign in to unlock AI tutor
When designing a zero trust architecture for a data platform, which elements are essential to ensure every access request is authenticated, authorized, and encrypted, no matter where it originates?
A
Traditional perimeter-based security models supplemented with 2FA for internal access.
B
Mandatory VPN usage for all data access, paired with regular password rotation policies.
C
Network segmentation, VPN access, and firewall rules based on static IP addresses.
D
Continuous authentication, micro-segmentation, and least privilege access controls integrated with behavioral analytics.