ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 157 - SC-100 discussion

Report
Export

You have legacy operational technology (OT) devices and loT devices.

You need to recommend best practices for applying Zero Trust principles to the OT and loT devices based on the Microsoft Cybersecurity Reference Architectures (MCRA). The solution must minimize the risk of disrupting business operations.

Which two security methodologies should you include in the recommendation? Each correct answer presents part of the solution.

NOTE: Each correct selection is worth one point

A.

passive traffic monitoring

Answers
A.

passive traffic monitoring

B.

active scanning

Answers
B.

active scanning

C.

threat monitoring

Answers
C.

threat monitoring

D.

software patching

Answers
D.

software patching

Suggested answer: C, D
asked 05/10/2024
Luyanda Hatta
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first