Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Verification of user and device identity is to be enabled for:

A.

Any person who wants to connect to an enterprise-controlled application, including employees, third parties, and partners.

B.

Remote employees only.

C.

Untrusted third parties only.

D.

Employees connecting from unmanaged endpoint devices only.

What is the trend that is increasing security risk through legacy solutions that drive network sprawl?

A.

A spread-out group of access control lists (ACLs) and firewall rules, with each firewall and VPN appliance only enforcing a subset of the total rule list.

B.

A desire to replace edge routers with SD-WAN boxes, which can leverage multiple uplinks for active-active VPN failover.

C.

An ongoing dependence on Layer 2 and Layer 3 switching, without consideration for upcoming 5G architectures.

D.

More applications moving to the cloud, users being remote, and VPNs and firewalls extending IP connectivity out to several different locations.