PdfPrep.com

Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.

Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.
A . It cannot identify command-and-control traffic.
B . It cannot monitor all potential network ports.
C . It assumes that all internal devices are untrusted.
D . It assumes that every internal endpoint can be trusted.

Answer: D

Exit mobile version