Microsoft 365 Fundamentals MS-900 Practice Question
An organization is seeking a security approach where all access requests are authenticated and authorized regardless of the user's location, even within the corporate network. This approach enforces least-privilege access policies and assumes that breaches are inevitable.
Which security model is the organization adopting?
The Zero Trust Model requires all access requests to be authenticated and authorized, regardless of network location, enforcing least-privilege access and assuming that breaches will occur. This aligns with the organization's described approach.
The Perimeter-Based Security Model trusts internal network traffic, which does not meet the requirement to authenticate all requests.
The Trust but Verify Model suggests initial trust with subsequent verification, not constant authentication.
The Defense in Depth model involves multiple layers of security but does not specifically require authenticating every access request regardless of location.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'least-privilege access' mean in a Zero Trust Model?
Open an interactive chat with Bash
How does authentication work under the Zero Trust Model?
Open an interactive chat with Bash
Why is assuming that breaches are inevitable important in a security model?
Open an interactive chat with Bash
Microsoft 365 Fundamentals MS-900
Describe security, compliance, privacy, and trust in Microsoft 365
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Oh snap!
Loading...
Loading...
Loading...
Information Technology Package Join Premium for Full Access