Microsoft Cybersecurity Architect Expert SC-100

Microsoft Cybersecurity Architect Expert SC-100

Get started today

Ultimate access to all questions.


You are tasked with specifying priorities for mitigating threats to data in your organization. Given the diverse data types and storage solutions used, how would you rank the importance of encryption, access controls, and threat detection in your strategy?




Explanation:

While all three components are crucial, encryption should be prioritized first as it provides a foundational layer of security that protects data at rest and in transit. Access controls are next as they manage who can access the data, and threat detection is important but should be prioritized after ensuring data is encrypted and access is controlled.