The correct answers are C and D . In legacy architectures, when an application or database is moved from a private data center to a cloud environment, access is often preserved by extending the existing network-centric trust model . One common method is to give the workload a public IP address so it can be reached directly over the internet. Another is to extend MPLS or other routable WAN connectivity into the cloud so that the application remains part of an IP-reachable enterprise network. These are classic legacy approaches because they preserve network reachability instead of shifting to identity-based, application-specific access.
By contrast, Zscaler’s Zero Trust guidance states that users should access applications without sharing network context or routing domain with them. The user can be anywhere, the application can be hosted anywhere, and policy should be granular and context-based , not dependent on exposing services on a routable network. That is why direct internet exposure and MPLS-style extension are considered legacy methods, while Zero Trust replaces them with brokered, application-aware access that minimizes discoverability and lateral movement.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit