Knowledge check

Completed 200 XP
1.

Why is it important to identify your attack surface?

2.

Why should you register your endpoints with a cloud identity provider?

3.

Your organization uses compliance policies to satisfy security requirements. What should your organization do for noncompliant devices?


Next unit: Summary

Previous Next