Assume breach
Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.
https://www.microsoft.com/en-us/security/business/zero-trust
Answer is correct.
Assume breach.
Minimize blast radius for breaches and prevent lateral movement by segmenting access by network, user, devices, and application awareness
The key words here are "uses segmented access for networks, users, devices, and applications is .."
While "least privilege" is just in time and just enough access and "assume breach" is more for end to end encryption..
Answer is definitely C
What are the three principles of Zero Trust?
It should be "Verify explicitly"
As business and technology continue to evolve, the three core principles of Zero Trust security remain consistent. Never trust. Always verify. Implement Zero Trust security for your business.
This section is not available anymore. Please use the main Exam Page.MS-900 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Cooljoy7777
Highly Voted 2 years agoroberto1971
Highly Voted 1 year, 8 months ago63f09a5
Most Recent 3 weeks, 3 days agoGaraioYohana
8 months, 1 week ago4rk4n4
1 year, 11 months agostella_mah
2 years, 1 month agostella_mah
2 years, 1 month agostella_mah
2 years, 1 month agostella_mah
2 years, 1 month agostella_mah
2 years, 1 month ago