exam questions

Exam MS-900 All Questions

View all questions & answers for the MS-900 exam

Exam MS-900 topic 1 question 390 discussion

Actual exam question from Microsoft's MS-900
Question #: 390
Topic #: 1
[All MS-900 Questions]

A company uses Microsoft 365.

The company requires that you implement solutions for explicit verification.

You need to recommend solutions that meet the requirements.

Which three solutions should you recommend? Each correct answer presents a complete solution.

NOTE: Each correct selection is worth one point.

  • A. Multifactor authentication (MFA)
  • B. Just-in-time (IT) access
  • C. Passwordless authentication
  • D. Block legacy authentication
  • E. Privileged Access Workstations (PAW) devices
Show Suggested Answer Hide Answer
Suggested Answer: ABE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
essamab
Highly Voted 1 year, 8 months ago
Correct answer is ACD. The JIT and PAW are least-privileged access Reference: https://learn.microsoft.com/en-us/security/zero-trust/deploy/networks https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-devices
upvoted 11 times
...
atommo999
Highly Voted 1 year, 9 months ago
Selected Answer: ABE
https://www.microsoft.com/insidetrack/blog/implementing-a-zero-trust-security-model-at-microsoft/ Verify identity: MFA Verify device: PAW Verify access: JIT
upvoted 8 times
...
dlwPieter
Most Recent 2 months, 3 weeks ago
Selected Answer: ACD
JIT and PAW are for Least Privileged Access not for explicit verification
upvoted 1 times
...
Sergio_G_S
3 months, 2 weeks ago
Selected Answer: ACD
Options B (Just-in-time access) and E (Privileged Access Workstations) are important solutions for access and security management, but they are not directly related to explicit verification in terms of authentication.
upvoted 2 times
...
GaraioYohana
8 months, 1 week ago
On Exam 21/08/2024
upvoted 1 times
...
Pand2
1 year, 1 month ago
Selected Answer: ACD
Given answer is correct
upvoted 2 times
...
tattybizzy
1 year, 2 months ago
Selected Answer: ACD
Simple reason: Options B, E are for access management - this is authorization concept not *authentication*. Also, Methods A, and B are very common, even to non admin users, if you have a business/enterprise subscription.
upvoted 1 times
...
Alessio_ET
1 year, 3 months ago
Selected Answer: ACE
Policies for explicit verification
upvoted 1 times
...
Jeff261290
1 year, 4 months ago
Selected Answer: ABD
According to Chatgpt Multifactor authentication (MFA): This solution requires users to provide two or more forms of authentication before accessing a resource. This can include something the user knows (such as a password), something the user has (such as a smart card), or something the user is (such as a fingerprint). MFA provides an additional layer of security to protect against unauthorized access. Just-in-time (JIT) access: This solution provides temporary access to resources only when needed. JIT access can be used to grant access to users who require it for a specific task or time period. This helps to reduce the risk of unauthorized access and limit the exposure of sensitive data. Block legacy authentication: This solution blocks authentication requests that use legacy protocols such as POP, IMAP, and SMTP. Legacy authentication protocols are less secure than modern authentication protocols and can be exploited by attackers to gain unauthorized access to resources.
upvoted 3 times
...
gnome4ex
1 year, 5 months ago
A and D Definitely - https://learn.microsoft.com/en-us/security/zero-trust/deploy/identity
upvoted 1 times
...
mhaniel
1 year, 10 months ago
Correct ACE Above PAW on Microsoft ZERO TRUST documentation. https://learn.microsoft.com/en-us/security/zero-trust/azure-infrastructure-virtual-machines
upvoted 2 times
...
TypeRR
1 year, 10 months ago
I think answer ACD are all correct.
upvoted 3 times
...
Murtuza
1 year, 11 months ago
Multifactor authentication (MFA) Just-in-time (IT) access Privileged Access Workstations (PAW) devices These ( 3 ) follows zero trust model for explicit verification
upvoted 6 times
TypeRR
1 year, 10 months ago
Just-in-time (IT) access Privileged Access Workstations (PAW) devices are Use least-privilege access.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago