Microsoft 365 Fundamentals MS-900 Practice Question
An organization wants to enhance its security by ensuring that all access requests are authenticated and authorized, regardless of the user's location or the network they're using. They plan to verify every user and device before granting access to resources, both inside and outside their network. Which security model does this organization intend to implement?
Perimeter-Based security model
Least Privilege security model
Zero Trust security model
Defense-in-Depth security model