Microsoft 365 Fundamentals MS-900 Practice Question
An organization is seeking a security approach where all access requests are authenticated and authorized regardless of the user's location, even within the corporate network. This approach enforces least-privilege access policies and assumes that breaches are inevitable.
Which security model is the organization adopting?
Perimeter-Based Security Model
Defense in Depth Model
Trust but Verify Model
Zero Trust Model