exam questions

Exam MS-900 All Questions

View all questions & answers for the MS-900 exam

Exam MS-900 topic 1 question 389 discussion

Actual exam question from Microsoft's MS-900
Question #: 389
Topic #: 1
[All MS-900 Questions]

HOTSPOT
-

A company is evaluating Zero Trust security principles for Microsoft 365.

You need to identify a Zero Trust security principle used in Microsoft 365.

Select the answer that correctly completes the sentence.

Show Suggested Answer Hide Answer
Suggested Answer:

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Cooljoy7777
Highly Voted 2 years, 2 months ago
Assume breach Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses. https://www.microsoft.com/en-us/security/business/zero-trust
upvoted 8 times
...
roberto1971
Highly Voted 1 year, 11 months ago
Answer is correct. Assume breach. Minimize blast radius for breaches and prevent lateral movement by segmenting access by network, user, devices, and application awareness
upvoted 5 times
...
5af6d66
Most Recent 2 weeks, 2 days ago
. Assume Breach Concept: Always assume your network is compromised or will be. Segmentation Impact: Network segmentation limits the "blast radius" of a breach. Micro-segmentation ensures that even if an attacker compromises one system, they can’t freely move laterally to others. Applies to users, devices, apps, and workloads
upvoted 1 times
...
63f09a5
3 months ago
least privileged access
upvoted 1 times
...
GaraioYohana
10 months, 2 weeks ago
On Exam 21/08/2024
upvoted 2 times
...
4rk4n4
2 years, 1 month ago
Answer is correct. Source: https://learn.microsoft.com/en-us/security/zero-trust/deploy/networks
upvoted 4 times
...
stella_mah
2 years, 3 months ago
The key words here are "uses segmented access for networks, users, devices, and applications is .." While "least privilege" is just in time and just enough access and "assume breach" is more for end to end encryption.. Answer is definitely C
upvoted 2 times
...
stella_mah
2 years, 3 months ago
https://www.microsoft.com/en-us/security/business/zero-trust
upvoted 1 times
...
stella_mah
2 years, 3 months ago
What are the three principles of Zero Trust? It should be "Verify explicitly" As business and technology continue to evolve, the three core principles of Zero Trust security remain consistent. Never trust. Always verify. Implement Zero Trust security for your business.
upvoted 1 times
...
stella_mah
2 years, 3 months ago
least privilege access
upvoted 1 times
stella_mah
2 years, 3 months ago
the answer is accurate.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...