The correct answer is that the Zero Trust model operates on the principle of assuming breach and explicitly verifying every access request. The model's motto is "never trust, always verify," meaning that no request is trusted by default, regardless of whether it originates from inside or outside the corporate network.
The other options are incorrect. Trusting internal network traffic is a feature of older, perimeter-based security models, which Zero Trust replaces. Verifying users only once at the perimeter is also a characteristic of traditional models. Zero Trust is a holistic strategy that applies to identities, devices, applications, and networks, not just one of these pillars.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Zero Trust Model?
Open an interactive chat with Bash
Why does Microsoft adopt the Zero Trust approach?
Open an interactive chat with Bash
What are the key principles of the Zero Trust Model?
Open an interactive chat with Bash
Microsoft 365 Fundamentals MS-900
Describe security, compliance, privacy, and trust in Microsoft 365
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access