A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture. What are two steps in this process? (Choose two.)
A.
Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls.
B.
Categorize data and applications by levels of sensitivity.
C.
Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall.
D.
Validate user identities through authentication.
Answer:
b
User Votes:
A
50%
B 2 votes
50%
C
50%
D 2 votes
50%
Discussions
0/ 1000
Eze
6 months, 2 weeks ago
B and D is Correct
sknathan1974
5 months, 3 weeks ago
Option C is not allowed due to "Port and Protocol Firewall" which generally denotes a non-PANOS Firewall
Want to join our community?
Please log in or signup in order to use this feature
B and D is Correct
Option C is not allowed due to "Port and Protocol Firewall" which generally denotes a non-PANOS Firewall