Q. Which network device can function as a ZTNA access proxy? Select one: - Authentication server - Policy server - Firewall- Router Q. Which statement best describes the zero-trust approach that is the basis for ZTNA design? Select one: - No device or user can be trusted inside or outside the network. - IoT and BYOD devices must be authenticated before they are trusted. - After devices are authe..