Microsoft 365 Fundamentals MS-900 Practice Question
A company is overhauling its security framework to better protect against modern cyber threats. They aim to verify every access request thoroughly, regardless of where the user is connecting from or which device they're using.
Which security model should the company adopt to meet these requirements?
The Zero Trust Model is the correct choice because it operates on the principle of "never trust, always verify". This model requires strict authentication and authorization for every user and device attempting to access resources, regardless of their location or network. This aligns with the company's goal of thoroughly verifying every access request.
The Implicit Trust Model assumes users inside the network are trustworthy, which doesn't meet the company's stringent verification requirements.
The Perimeter-based Security Model focuses on securing the network boundary but doesn't enforce strict verification for internal users.
The Open Access Model allows broad access without stringent verification, which would not enhance security against modern threats.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key principles of the Zero Trust Model?
Open an interactive chat with Bash
How does the Zero Trust Model differ from traditional security frameworks?
Open an interactive chat with Bash
What types of technologies support the implementation of a Zero Trust Model?
Open an interactive chat with Bash
Microsoft 365 Fundamentals MS-900
Describe security, compliance, privacy, and trust in Microsoft 365
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access