The correct answer isBbecause the foundation of Aruba’s Zero Trust Security strategy isvisibility, control, and continuous monitoring of all users and devices—including IoT—on the network.Aruba highlights that Zero Trust is not achieved simply with perimeter defenses but requires pervasive identity-based controls and segmentation inside the network.
Relevant extracts from official HPE Aruba Networking documentation:
“Zero Trust begins with full-spectrum visibility of all devices, users, and workloads connecting to the network to ensure nothing is trusted by default.”
“With Aruba ClearPass Device Insight and Aruba Central Client Insights, organizations gain the visibility and control required to enforce least-privilege access policies for users and IoT devices.”
“The inability to see and control unmanaged IoT devices represents a major security blind spot that Zero Trust frameworks directly address.”
“Aruba’s Zero Trust model applies identity-based access and dynamic segmentation to secure all connected endpoints, regardless of location or device type.”
Why the other options are incorrect:
AWireless encryption knowledge is not a determining factor for Zero Trust adoption—it is too narrow and technical.
CPerimeter firewalls are legacy security strategies; Aruba stresses that Zero Trust must focus inside the network, not just at the perimeter.
DUser experience on personal devices (BYOD) is relevant but does not directly uncover a Zero Trust use case. The primary driver is IoT and endpoint visibility with policy enforcement.
References (HPE Aruba Networking Solutions / Study Guides):
Aruba Zero Trust Security — Solution Overview
Aruba ESP (Edge Services Platform) Security White Paper
Aruba ClearPass Device Insight — Technical Guide
Aruba Central Client Insights — Solution Brief
===========
Submit