
Answer-first summary for fast verification
Answer: Block sign-in attempts from unknown locations., Block sign-in attempts from noncompliant devices.
In a Zero Trust security strategy, two important security controls are to block sign-in attempts from unknown locations and noncompliant devices. Zero Trust principles emphasize verifying every access request as though it originates from an open network. Therefore, always allowing connections from the on-premises network (A) violates the Zero Trust principle. Disabling passwordless sign-ins (B) does not align with the modern authentication methods recommended, such as multi-factor and passwordless authentication.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
You manage an on-premises network along with a Microsoft 365 subscription and are tasked with developing a comprehensive Zero Trust security strategy. Considering the principles of Zero Trust security, which emphasizes continuous verification and least-privilege access, identify two security controls that should be integrated into your Zero Trust architecture. Each correct answer constitutes a crucial element of this security approach. NOTE: Each correct answer is worth one point.
A
Always allow connections from the on-premises network.
B
Disable passwordless sign-in for sensitive accounts.
C
Block sign-in attempts from unknown locations.
D
Block sign-in attempts from noncompliant devices.