Ultimate access to all questions.
You are responsible for evaluating the security of legacy operational technology (OT) devices and Internet of Things (IoT) devices within your organization. To enhance the security posture of these devices, you need to implement Zero Trust principles according to the guidelines provided by the Microsoft Cybersecurity Reference Architectures (MCRA). Your objective is to ensure that the implementation of these security practices does not interfere with the ongoing business operations. What are two security methodologies you should incorporate into your strategy? Each correct choice constitutes part of the overall solution. NOTE: Each correct selection is worth one point.