pse-strata question 60 discussion

View all Palo Alto Networks System Engineer Professional - Strata here
back to palo-alto-networks forum

Question 60

A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.
What are two steps in this process? (Choose two.)

  • A. Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls.
  • B. Categorize data and applications by levels of sensitivity.
  • C. Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall.
  • D. Validate user identities through authentication.
Answer:

b

User Votes:
A
50%
B 2 votes
50%
C
50%
D 2 votes
50%
Discussions
0 / 1000
Eze
6 months, 2 weeks ago

B and D is Correct

sknathan1974
5 months, 3 weeks ago

Option C is not allowed due to "Port and Protocol Firewall" which generally denotes a non-PANOS Firewall