exam questions

Exam 700-765 All Questions

View all questions & answers for the 700-765 exam

Exam 700-765 topic 1 question 46 discussion

Actual exam question from Cisco's 700-765
Question #: 46
Topic #: 1
[All 700-765 Questions]

Which statement best embodies trust-centric security?

  • A. Verify before granting access via identity-based policies for users, devices, apps, and locations
  • B. Prevent attacks via an intelligence-based policy, then detect, investigate, and remediate.
  • C. Verify before granting access via MDM software.
  • D. Protect users from attacks by enabling strict security policies.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
bananebl
6 months, 1 week ago
Verify before granting access via identity-based policies for users, devices, apps, and locations. https://salesconnect.cloudapps.cisco.com/vid/index.html?cid=e02d6772-2e4b-4152-b99c-7aa75f995034 @ 06:35
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...