Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam SC-900 All Questions

View all questions & answers for the SC-900 exam

Exam SC-900 topic 1 question 23 discussion

Actual exam question from Microsoft's SC-900
Question #: 23
Topic #: 1
[All SC-900 Questions]

Which three statements accurately describe the guiding principles of Zero Trust? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.

  • A. Define the perimeter by physical locations.
  • B. Use identity as the primary security boundary.
  • C. Always verify the permissions of a user explicitly.
  • D. Always assume that the user system can be breached.
  • E. Use the network as the primary security boundary.
Show Suggested Answer Hide Answer
Suggested Answer: BCD 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
indecisivez
Highly Voted 2 years, 5 months ago
BCD is correct
upvoted 23 times
...
Clouddog
Highly Voted 2 years, 5 months ago
Correct, Zero Trust is a security a strategy. It is not a product or a service, but an approach in designing and implementing the following set of security principles: Verify explicitly Use least privilege access Assume breach
upvoted 15 times
Clouddog
2 years, 5 months ago
For more information: https://docs.microsoft.com/en-us/security/zero-trust/zero-trust-overview
upvoted 4 times
...
...
DK21Dilip
Most Recent 2 months ago
this question came in july 2024
upvoted 1 times
...
Maqsoof
5 months, 4 weeks ago
BCD is correct
upvoted 1 times
...
Francielle
8 months, 3 weeks ago
Selected Answer: BCD
C and D are Zero Trust principles, while B can also be explained by having the least possible privileges for an user (identity), thus being the primary security boundary.
upvoted 4 times
...
Crucius
1 year, 1 month ago
Selected Answer: BCD
Correct.
upvoted 1 times
...
Molota
1 year, 4 months ago
B. Use identity as the primary security boundary. Most Voted C. Always verify the permissions of a user explicitly. Most Voted D. Always assume that the user system can be breached.
upvoted 1 times
...
ismalo
1 year, 8 months ago
BCD is my answer
upvoted 1 times
...
walkaway
1 year, 9 months ago
Selected Answer: BCD
Just use the exclusion method to answer this question. A and E violate Zero Trust principles. BCD = Correct answer
upvoted 2 times
...
mikcs
1 year, 9 months ago
Selected Answer: BCD
on exam 12/12/22
upvoted 2 times
...
yogur83
1 year, 10 months ago
Selected Answer: BCD
https://docs.microsoft.com/en-us/security/zero-trust/zero-trust-overview
upvoted 2 times
...
Zeus009
2 years ago
Correct
upvoted 3 times
...
cantbeme
2 years, 1 month ago
on exam today
upvoted 4 times
...
simonseztech
2 years, 1 month ago
Selected Answer: BCD
BCD is correct
upvoted 2 times
...
AdityaGupta
2 years, 1 month ago
Selected Answer: BCD
B. Use identity as the primary security boundary. Most Voted C. Always verify the permissions of a user explicitly. Most Voted D. Always assume that the user system can be breached.
upvoted 1 times
...
tomtmario
2 years, 2 months ago
Selected Answer: BCD
Correct answer
upvoted 1 times
...
choquedi
2 years, 3 months ago
Selected Answer: BCD
Correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...