What is the most complete explanation of the Zero Trust Methodology?(1 point) Responses No device is considered trusted, and each action must be validated. No device is considered trusted, and each action must be validated. No one is considered trusted, and each action must be validated. No one is considered trusted, and each action must be validated. No one and no device are considered trusted, and each action must be validated. No one and no device are considered trusted, and each action must be validated. Some devices and users are considered trusted, and actions are considered validated.

No one and no device are considered trusted, and each action must be validated. This means that in the Zero Trust Methodology, all users and devices on a network are treated as potential threats, and every action they take must be verified and validated to prevent unauthorized access or activity.