Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam SC-900 All Questions

View all questions & answers for the SC-900 exam

Exam SC-900 topic 1 question 11 discussion

Actual exam question from Microsoft's SC-900
Question #: 11
Topic #: 1
[All SC-900 Questions]

HOTSPOT -
For each of the following statements, select Yes if the statement is true. Otherwise, select No.
NOTE: Each correct selection is worth one point.
Hot Area:

Show Suggested Answer Hide Answer
Suggested Answer:
Box 1: Yes -

Box 2: Yes -

Box 3: No -
The Zero Trust model does not assume that everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originated from an uncontrolled network.
Reference:
https://docs.microsoft.com/en-us/security/zero-trust/

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
yulexam
Highly Voted 1 week, 6 days ago
Correct... principles of zero trust: Verify explicitly, Least privileged access, Assume breach
upvoted 31 times
...
Matic_Prime
Highly Voted 3 years, 1 month ago
correct
upvoted 17 times
...
RahulX
Most Recent 1 year, 1 month ago
Microsoft Zero Trust is a security strategy based on the principle of Verify explicitly, Use least privilege access, Assume breach.
upvoted 2 times
...
Kelsi999
1 year, 5 months ago
The answers are correct. I had this question on the exam today
upvoted 3 times
...
kxa57482
1 year, 6 months ago
YES YES NO
upvoted 3 times
...
Whyiest
1 year, 8 months ago
Correct
upvoted 3 times
...
gustavomelquiades
2 years, 3 months ago
Answare is - Y Y N "This is the core of Zero Trust. Instead of believing everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originated from an uncontrolled network." https://docs.microsoft.com/en-us/security/zero-trust/zero-trust-overview
upvoted 3 times
...
GMardones
2 years, 6 months ago
Correct
upvoted 1 times
...
itelessons
2 years, 6 months ago
Instead of believing everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originated from an uncontrolled network.
upvoted 5 times
...
BlackdaRipper
2 years, 7 months ago
Correct answer
upvoted 1 times
...
Gringusss
2 years, 7 months ago
YYN is correct
upvoted 1 times
...
Sukhi4fornet
3 years, 3 months ago
correct
upvoted 8 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...