The correct answer is that the Zero Trust model operates on the principle of assuming breach and explicitly verifying every access request. The model's motto is "never trust, always verify," meaning that no request is trusted by default, regardless of whether it originates from inside or outside the corporate network.
The other options are incorrect. Trusting internal network traffic is a feature of older, perimeter-based security models, which Zero Trust replaces. Verifying users only once at the perimeter is also a characteristic of traditional models. Zero Trust is a holistic strategy that applies to identities, devices, applications, and networks, not just one of these pillars.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'assume breach' mean in the context of Zero Trust security?
Open an interactive chat with Bash
How does Zero Trust differ from traditional perimeter-based security models?
Open an interactive chat with Bash
What are some key technologies used to implement a Zero Trust model?
Open an interactive chat with Bash
Microsoft 365 Fundamentals MS-900
Describe security, compliance, privacy, and trust in Microsoft 365
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .