In the context of mitigating ransomware attacks, how would you design a strategy that prioritizes the protection of BCDR tools and data while also managing privileged access to these resources? Consider the use of Microsoft's Privileged Identity Management (PIM) and other relevant tools. | Microsoft Cybersecurity Architect Expert SC-100 Quiz - LeetQuiz