Correct Answer: Never trust, always verify
Explanation: Zero-trust security assumes that threats can exist inside and outside the network, requiring strict verification for all access attempts.
Correct Answer: Never trust, always verify
Explanation: Zero-trust security assumes that threats can exist inside and outside the network, requiring strict verification for all access attempts.