ExamGecko
Question list
Search
Search

Related questions











Question 120 - PSE-Strata discussion

Report
Export

Within the Five-Step Methodology of Zero Trust, in which step would application access and user access be defined?

A.
Step 3: Architect a Zero Trust Network
Answers
A.
Step 3: Architect a Zero Trust Network
B.
Step 5. Monitor and Maintain the Network
Answers
B.
Step 5. Monitor and Maintain the Network
C.
Step 4: Create the Zero Trust Policy
Answers
C.
Step 4: Create the Zero Trust Policy
D.
Step 1: Define the Protect Surface
Answers
D.
Step 1: Define the Protect Surface
E.
Step 2 Map the Protect Surface Transaction Flows
Answers
E.
Step 2 Map the Protect Surface Transaction Flows
Suggested answer: D
asked 23/09/2024
CARL COUCH
44 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first