
Ultimate access to all questions.
Your organization is implementing a Zero Trust security model and is in the process of validating the alignment of its Conditional Access policies with this strategy. The organization operates in a highly regulated industry, requiring strict compliance with data protection standards. Additionally, the organization aims to minimize operational costs while ensuring scalability across its global operations. Which of the following steps should be avoided during the validation process to ensure the Conditional Access policies effectively support the Zero Trust strategy, considering the organization's constraints? (Choose one option)
A
Reviewing the Conditional Access policies to ensure they dynamically adjust based on user roles, attributes, and the sensitivity of the accessed resources, thereby supporting compliance and scalability.
B
Enabling Conditional Access policies uniformly across all users and resources without evaluating the context of access requests, such as user location, device compliance, and the sensitivity of the resource.
C
Validating that the Conditional Access policies incorporate real-time risk assessment from Azure AD Identity Protection to adapt access controls based on the current risk level of the sign-in attempt.
D
Configuring Conditional Access policies to grant access based solely on the user's network location, disregarding other critical signals like device state and user behavior analytics.