exam questions

Exam SC-900 All Questions

View all questions & answers for the SC-900 exam

Exam SC-900 topic 1 question 23 discussion

Actual exam question from Microsoft's SC-900
Question #: 23
Topic #: 1
[All SC-900 Questions]

Which three statements accurately describe the guiding principles of Zero Trust? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

  • A. Define the perimeter by physical locations.
  • B. Use identity as the primary security boundary.
  • C. Always verify the permissions of a user explicitly.
  • D. Always assume that the user system can be breached.
  • E. Use the network as the primary security boundary.
Show Suggested Answer Hide Answer
Suggested Answer: BCD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
indecisivez
Highly Voted 2 years, 9 months ago
BCD is correct
upvoted 24 times
...
Clouddog
Highly Voted 2 years, 9 months ago
Correct, Zero Trust is a security a strategy. It is not a product or a service, but an approach in designing and implementing the following set of security principles: Verify explicitly Use least privilege access Assume breach
upvoted 16 times
Clouddog
2 years, 9 months ago
For more information: https://docs.microsoft.com/en-us/security/zero-trust/zero-trust-overview
upvoted 4 times
...
...
TechyStacy
Most Recent 20 hours, 20 minutes ago
Selected Answer: BCD
Least privilege, Verify explicitly, Assume breach
upvoted 1 times
...
LegendaryZA
4 months, 1 week ago
Selected Answer: BCD
The answers are: B. Use identity as the primary security boundary. C. Always verify the permissions of a user explicitly. D. Always assume that the user system can be breached. https://www.microsoft.com/en-za/security/business/zero-trust
upvoted 2 times
...
DK21Dilip
6 months, 1 week ago
this question came in july 2024
upvoted 2 times
...
Maqsoof
10 months, 1 week ago
BCD is correct
upvoted 1 times
...
Francielle
1 year ago
Selected Answer: BCD
C and D are Zero Trust principles, while B can also be explained by having the least possible privileges for an user (identity), thus being the primary security boundary.
upvoted 4 times
...
Crucius
1 year, 5 months ago
Selected Answer: BCD
Correct.
upvoted 1 times
...
Molota
1 year, 8 months ago
B. Use identity as the primary security boundary. Most Voted C. Always verify the permissions of a user explicitly. Most Voted D. Always assume that the user system can be breached.
upvoted 1 times
...
ismalo
2 years ago
BCD is my answer
upvoted 1 times
...
walkaway
2 years, 1 month ago
Selected Answer: BCD
Just use the exclusion method to answer this question. A and E violate Zero Trust principles. BCD = Correct answer
upvoted 2 times
...
mikcs
2 years, 2 months ago
Selected Answer: BCD
on exam 12/12/22
upvoted 2 times
...
yogur83
2 years, 2 months ago
Selected Answer: BCD
https://docs.microsoft.com/en-us/security/zero-trust/zero-trust-overview
upvoted 2 times
...
Zeus009
2 years, 5 months ago
Correct
upvoted 3 times
...
cantbeme
2 years, 5 months ago
on exam today
upvoted 4 times
...
simonseztech
2 years, 5 months ago
Selected Answer: BCD
BCD is correct
upvoted 2 times
...
AdityaGupta
2 years, 6 months ago
Selected Answer: BCD
B. Use identity as the primary security boundary. Most Voted C. Always verify the permissions of a user explicitly. Most Voted D. Always assume that the user system can be breached.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago