List of questions
Related questions
Question 102 - PSE-Strata discussion
A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.
What are two steps in this process? (Choose two.)
A.
Validate user identities through authentication
B.
Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall
C.
Categorize data and applications by levels of sensitivity
D.
Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls
Your answer:
0 comments
Sorted by
Leave a comment first