ECCouncil Certified Ethical Hacker Exam (CEHv12) 312-50v12 Question # 155 Topic 16 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv12) 312-50v12 Question # 155 Topic 16 Discussion

312-50v12 Exam Topic 16 Question 155 Discussion:
Question #: 155
Topic #: 16

Eric, a cloud security engineer, implements a technique for securing the cloud resources used by his organization. This technique assumes by default that a user attempting to access the network is not an authentic entity and verifies every incoming connection before allowing access to the network. Using this technique, he also imposed conditions such that employees can access only the resources required for their role.

What is the technique employed by Eric to secure cloud resources?


A.

Serverless computing


B.

Demilitarized zone


C.

Container technology


D.

Zero trust network


Get Premium 312-50v12 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.