
Ultimate access to all questions.
When designing solutions to mitigate ransomware attacks, how would you prioritize business continuity and disaster recovery (BCDR) alongside privileged access management? Provide a detailed strategy that includes the use of Microsoft Identity and Access Management solutions.
A
Prioritize BCDR without considering privileged access management.
B
Integrate Microsoft's Identity and Access Management solutions to control and monitor privileged access, ensuring that only authorized personnel can access critical BCDR tools and data.
C
Focus only on privileged access management and ignore BCDR.
D
Use generic access controls without specific focus on privileged access or BCDR.