Microsoft 365 Fundamentals MS-900 Practice Question
An IT administrator is tasked with improving the organization's security posture by ensuring that all access to corporate resources is authenticated, authorized, and encrypted, regardless of where the request originates or what resource is accessed. Which security approach best aligns with this strategy?
Defense-in-Depth Strategy
Perimeter Security Model
Zero Trust Model
Role-Based Access Control (RBAC)