Microsoft Azure Fundamentals AZ-900 Practice Question
Your company wants to enhance its security by ensuring that every access request to cloud resources is authenticated, authorized, and encrypted, regardless of where the request originates. Which security approach should your company adopt to meet this requirement?
Zero Trust security model aligns with the company's requirement to authenticate, authorize, and encrypt all access requests regardless of origin. Zero Trust operates under the principle of "never trust, always verify", ensuring strict verification for every request to enhance security.
Perimeter-based security assumes that all users inside the network are trusted, which does not meet the company's requirement for verifying all access requests.
Role-based Access Control (RBAC) provides authorization based on user roles but does not necessarily enforce authentication and encryption of all requests.
Single sign-on (SSO) simplifies authentication but does not ensure the continuous validation and encryption required by the company's security policy.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Zero Trust security model?
Open an interactive chat with Bash
How does Zero Trust differ from traditional security models?
Open an interactive chat with Bash
What are some key components of implementing a Zero Trust security model?
Open an interactive chat with Bash
Microsoft Azure Fundamentals AZ-900
Azure Architecture and Services
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Oh snap!
Loading...
Loading...
Loading...
Information Technology Package Join Premium for Full Access