This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Choose the best response for each of the questions below.
Organizations should follow five steps to secure their identity infrastructure. Four of these steps include strengthening your credentials, automating threat response, increasing your awareness, and enabling user self-help. What is the fifth step to secure their identity infrastructure?
Implement multifactor authentication
Reducing the time criminals have to embed themselves into your environment
Reduce your attack surface area
As the Microsoft 365 Administrator for Adventure Works Cycles, Patti Fernandez wants to adopt a Zero Trust approach to security protection throughout the organization. Which of the following features is the policy engine at the heart of Microsoft's Zero Trust solution?
Threat Analytics
Microsoft Purview Insider Risk Management
Microsoft Entra Conditional Access
As the Microsoft 365 Administrator for Fabrikam, Inc., Allan Deyoung wants to implement a Zero Trust security model across the organization. What tool can Allan use to help determine where Fabrikam is in its journey across its identities, devices, apps, infrastructure, network, and data?
Microsoft Entra Conditional Access wizard
Zero Trust Assessment
Microsoft Defender for Office 365
You must answer all questions before checking your work.
Was this page helpful?