Microsoft 365 Fundamentals MS-900 Practice Question
As a security administrator at a company, you plan to adopt a security approach that treats all users and devices as untrusted by default, requiring strict authentication and authorization for every access request to company resources. Which security model best aligns with this approach?
The Zero Trust model is the security approach that assumes no user or device is trusted by default, whether inside or outside the network. It requires continuous verification of identities, credentials, and device health before granting access to resources. This model reduces the risk of security breaches by enforcing strict access controls and minimizing implicit trust.
Perimeter-based security relies on securing the network boundary and assumes that entities within the network are trusted, which does not account for internal threats.
Role-Based Access Control assigns permissions based on user roles but doesn't inherently distrust all users and devices by default or require continuous verification.
The Principle of Least Privilege ensures users have only the access necessary for their role but doesn't assume all entities are untrusted or enforce stringent verification for every access request.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main principles of the Zero Trust model?
Open an interactive chat with Bash
How does Zero Trust improve security compared to Perimeter-based security?
Open an interactive chat with Bash
What technologies can be used to implement a Zero Trust security model?
Open an interactive chat with Bash
Microsoft 365 Fundamentals MS-900
Describe security, compliance, privacy, and trust in Microsoft 365
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access