Microsoft 365 Fundamentals MS-900 Practice Question
An IT administrator is tasked with improving the organization's security posture by ensuring that all access to corporate resources is authenticated, authorized, and encrypted, regardless of where the request originates or what resource is accessed. Which security approach best aligns with this strategy?
The Zero Trust Model is the security approach that requires all users, whether inside or outside the organization's network, to be authenticated, authorized, and validated before being granted access to applications and data. It operates on the principle of 'never trust, always verify,' ensuring that every access request is thoroughly vetted.
The Perimeter Security Model assumes that users inside the network are trusted and focuses on securing the network's boundaries, which doesn't align with authenticating and authorizing all access requests.
Role-Based Access Control (RBAC) assigns permissions based on user roles but doesn't necessarily enforce authentication and authorization of every access request regardless of origin.
The Defense-in-Depth Strategy involves layering multiple security measures to protect data but doesn't specifically mandate the continuous verification of all access attempts as described.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key principles behind the Zero Trust Model?
Open an interactive chat with Bash
How does Zero Trust improve security compared to Perimeter Security?
Open an interactive chat with Bash
What is Role-Based Access Control (RBAC) and how does it relate to Zero Trust?
Open an interactive chat with Bash
Microsoft 365 Fundamentals MS-900
Describe security, compliance, privacy, and trust in Microsoft 365
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access