exam questions

Exam SC-900 All Questions

View all questions & answers for the SC-900 exam

Exam SC-900 topic 1 question 128 discussion

Actual exam question from Microsoft's SC-900
Question #: 128
Topic #: 1
[All SC-900 Questions]

DRAG DROP
-

Match the pillars of Zero Trust to the appropriate requirements.

To answer, drag the appropriate pillar from the column on the left to its requirement on the right. Each pillar may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Show Suggested Answer Hide Answer
Suggested Answer:

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ETU69
Highly Voted 1 year, 11 months ago
Correct
upvoted 8 times
...
LegendaryZA
Most Recent 1 month, 3 weeks ago
Answer: Network Identifies Data https://learn.microsoft.com/en-us/training/modules/describe-security-concepts-methodologies/4-describe-zero-trust-model
upvoted 1 times
...
Tahamaffia
1 year, 2 months ago
Got this question on my exam 05/09/2023
upvoted 2 times
...
masterb911
1 year, 4 months ago
Correct
upvoted 1 times
...
rollying
1 year, 7 months ago
correct !!
upvoted 1 times
...
zellck
1 year, 7 months ago
1. Networks 2. Identities 3. Data
upvoted 2 times
zellck
1 year, 7 months ago
https://learn.microsoft.com/en-us/training/modules/describe-security-concepts-methodologies/4-describe-zero-trust-model In the Zero Trust model, all elements work together to provide end-to-end security. These six elements are the foundational pillars of the Zero Trust model: - Identities may be users, services, or devices. When an identity attempts to access a resource, it must be verified with strong authentication, and follow least privilege access principles. - Data should be classified, labeled, and encrypted based on its attributes. Security efforts are ultimately about protecting data, and ensuring it remains safe when it leaves devices, applications, infrastructure, and networks that the organization controls. - Networks should be segmented, including deeper in-network micro segmentation. Also, real-time threat protection, end-to-end encryption, monitoring, and analytics should be employed.
upvoted 1 times
...
...
zeos38
1 year, 8 months ago
Correct
upvoted 1 times
...
obaali1990
1 year, 9 months ago
Correct
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago