Notifications
Clear all

What are two steps in this process?

1 Posts
1 Users
0 Likes
137 Views
(@delillovicente)
Posts: 721
Noble Member
Topic starter
 

A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.

What are two steps in this process? (Choose two.)

  • A . Validate user identities through authentication
    B. Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall
    C. Categorize data and applications by levels of sensitivity
    D. Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls

Show Answer Hide Answer

Suggested Answer: A,C
 
Posted : 23/01/2023 2:46 pm

Latest Paloalto Networks PSE Strata Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: