Free Microsoft Azure Fundamentals AZ-900 Practice Question

Your company is moving sensitive workloads to Azure and the security team insists on following the Zero Trust model for securing resources. Which approach aligns with the principles of the Zero Trust security model?

  • Implement minimal logging and analysis since users and devices are not trusted and require constant verification.

  • Enforce strict user identity verification for any access request regardless of the user's location in relation to the network perimeter.

  • Provide full access to all applications and services for anyone located within the corporate office.

  • Automatically trust users and devices within the corporate network but verify those coming from external networks.

This question's topic:
Microsoft Azure Fundamentals AZ-900 / 
Azure Architecture and Services
Your Score:

Check or uncheck an objective to set which questions you will receive.