Good Morning Future CISSPs!! - Practice Question (Domain 4: Communication and Network Security)
I felt like such a robot 🤖 posting the question this morning. I needed to say hello to all our wonderful members!! Okay, okay, the question... A company deploys a zero trust network where every request is authenticated, authorized, and encrypted. During an incident, investigators cannot reconstruct attack paths because traffic patterns are indistinguishable once inside the fabric. Security wants forensic clarity without weakening zero trust principles. What is the MOST appropriate architectural adjustment? A. Decrypt and inspect all internal traffic at centralized gateways B. Implement per request cryptographic identity and flow labeling C. Increase east west traffic logging at network choke points D. Reintroduce internal trust zones to simplify attribution Come back for the answer tomorrow, or study more now!