Notifications
Clear all
Topic starter
in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?
- A . Step 4. Create the Zero Trust policy.
B. Step 2: Map the transaction flows.
C. Step 3. Architect a Zero Trust network.
D. Step 1: Define the protect surface
Suggested Answer: D
Posted : 26/10/2022 7:20 am