List of questions
Related questions
Question 157 - SC-100 discussion
You have legacy operational technology (OT) devices and loT devices.
You need to recommend best practices for applying Zero Trust principles to the OT and loT devices based on the Microsoft Cybersecurity Reference Architectures (MCRA). The solution must minimize the risk of disrupting business operations.
Which two security methodologies should you include in the recommendation? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point
A.
passive traffic monitoring
B.
active scanning
C.
threat monitoring
D.
software patching
Your answer:
0 comments
Sorted by
Leave a comment first