
Answer-first summary for fast verification
Answer: Integrate Microsoft's PIM to manage and monitor privileged access to BCDR tools, ensuring that access is granted only when necessary and is fully auditable.
Integrating Microsoft's PIM to manage privileged access to BCDR tools ensures that these critical resources are protected from unauthorized access, enhancing overall security and resilience against ransomware attacks.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
In the context of mitigating ransomware attacks, how would you design a strategy that prioritizes the protection of BCDR tools and data while also managing privileged access to these resources? Consider the use of Microsoft's Privileged Identity Management (PIM) and other relevant tools.
A
Ignore privileged access management and focus solely on BCDR tools.
B
Integrate Microsoft's PIM to manage and monitor privileged access to BCDR tools, ensuring that access is granted only when necessary and is fully auditable.
C
Use generic access controls without specific focus on privileged access.
D
Store BCDR tools and data in unsecured environments.