ExamGecko
Question list
Search
Search

Related questions











Question 102 - PSE-Strata discussion

Report
Export

A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.

What are two steps in this process? (Choose two.)

A.
Validate user identities through authentication
Answers
A.
Validate user identities through authentication
B.
Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall
Answers
B.
Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall
C.
Categorize data and applications by levels of sensitivity
Answers
C.
Categorize data and applications by levels of sensitivity
D.
Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls
Answers
D.
Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls
Suggested answer: A, C
asked 23/09/2024
Raphael Oliveir
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first