Knowledge check

Completed
1.

Why is it important to identify your attack surface?

2.

Why should you register your endpoints with a cloud identity provider?

3.

Your organization uses compliance policies to satisfy security requirements. What should your organization do for noncompliant devices?