An organization wants to measure trust levels among internal systems. According to this manual, which tactic best demonstrates verifying trust between internal resources?
Evaluate each connection point, confirm how enforcement applies at each boundary, and validate the operation of claimed safeguards
Conduct tests on a small selection of devices following a randomly chosen sampling strategy
Inspect perimeter defenses while limiting testing within the internal environment for simpler metrics
Use multiple scanning utilities on endpoints, then compare results against vulnerability checklists
The recommended tactic is to systematically evaluate each connection between internal resources, verify how security controls are enforced at every boundary, and validate that all declared safeguards operate as intended. Vulnerability scans, perimeter-only tests, or random sampling do not deliver the thorough, evidence-based assurance this methodology requires.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'verifying trust between internal resources' mean?
Open an interactive chat with Bash
Why is random sampling not enough for verifying trust between systems?
Open an interactive chat with Bash
What tools can help validate safeguards and assess trust between systems?