Microsoft 365 Fundamentals MS-900 Practice Question
Which security model enforces strict verification of every user and device attempting to access network resources, without assuming any inherent trust?
Identity and Access Management (IAM) model
Role-Based Access Control (RBAC) model
Zero Trust security model
Perimeter security model