已不再支援此瀏覽器。
請升級至 Microsoft Edge,以利用最新功能、安全性更新和技術支援。
Choose the best response for each of the following questions.
Organizations should follow five steps to secure their identity infrastructure. Four of these steps include strengthening your credentials, automating threat response, increasing your awareness, and enabling user self-help. What is the fifth step to secure their identity infrastructure?
Implement multifactor authentication
Reducing the time criminals have to embed themselves into your environment
Reduce your attack surface area
As the Microsoft 365 Administrator for Adventure Works Cycles, Patti Fernandez wants to adopt a Zero Trust approach to security protection throughout the organization. Which of the following features is the policy engine at the heart of Microsoft's Zero Trust solution?
Threat Analytics
Microsoft Purview Insider Risk Management
Microsoft Entra Conditional Access
As the Microsoft 365 Administrator for Fabrikam, Inc., Allan Deyoung wants to implement a Zero Trust security model across the organization. What tool can Allan use to help determine where Fabrikam is in its journey across its identities, devices, apps, infrastructure, network, and data?
Microsoft Entra Conditional Access wizard
Zero Trust Assessment
Microsoft Defender for Office 365
You must answer all questions before checking your work.
此頁面對您有幫助嗎?