Scenario: An organization is conducting a gap analysis as a part of
its ZT planning. During which of the following steps will risk
appetite be defined?
What measures are needed to detect and stop malicious access
attempts in real-time and prevent damage when using ZTA's
centralized authentication and policy enforcement?