# PSE-SASE — Question 603

**Type:** multiple_choice
**Topics:** topic_1

## Question

In which step of the Five-Step Methodology of Zero Trust are application access and user access defined?

## Correct Answer

_See scenario._

## Explanation

Selected Answer: A
In Step 4 you define the security policy based on the Kipling method, which is equivalent to defining user and application access. Step 2 is about defining the flow between users and application/data. Step 3 is about designing the solution and placing the firewalls for micro segmentation

**Reference:** examtopics_top_comment

---
Source: https://hiexam.net/q/palo-alto/PSE-SASE/603  
Practice (tracked): https://hiexam.net/study/PSE-SASE/practice