Microsoft 365 Fundamentals MS-900 Practice Question
Your organization is moving away from a traditional security model and wants to ensure that every access request to its resources is authenticated, authorized, and encrypted.
Which principle of the Zero Trust Model addresses this requirement?
Assume breach
Encrypt data in transit and at rest
Verify explicitly
Use least privilege access