ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 328 - SY0-601 discussion

Report
Export

An organization recently released a zero-trust policy that will enforce who is able to remotely access certain dat

A.
Authenticated users who access the data must have a need to know, depending on their level of permissions.Which of the following is the first step the organization should take when implementing the policy?
Answers
A.
Authenticated users who access the data must have a need to know, depending on their level of permissions.Which of the following is the first step the organization should take when implementing the policy?
B.
Determine a quality CASB solution.
Answers
B.
Determine a quality CASB solution.
C.
Configure the DLP policies by user groups.
Answers
C.
Configure the DLP policies by user groups.
D.
Implement agentless NAC on boundary devices.
Answers
D.
Implement agentless NAC on boundary devices.
E.
Classify all data on the file servers.
Answers
E.
Classify all data on the file servers.
Suggested answer: D

Explanation:

zero trust is a security strategy that assumes breach and verifies each request as though it originates from an untrusted network12. A zero trust policy is a set of “allow rules” that specify conditions for accessing certain resources3.

According to one source4, the first step in implementing a zero trust policy is to identify and classify all data and assets in the organization. This helps to determine the level of sensitivity and risk associated with each resource and apply appropriate access controls. Classifying all data on the file servers is the first step in implementing a zero trust policy because it helps to determine the level of sensitivity and risk associated with each resource and apply appropriate access controls.

Reference: Zero Trust implementation guidance | Microsoft Learn

asked 02/10/2024
Coleman Owie
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first