Posted by: Pdfprep
Post Date: December 2, 2020
Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.
A . It cannot identify command-and-control traffic.
B . It cannot monitor all potential network ports.
C . It assumes that all internal devices are untrusted.
D . It assumes that every internal endpoint can be trusted.
Answer: D
Leave a Reply