hiexam
palo-alto · PSE-SASE · Q603 · multiple_choice · topic_1

In which step of the Five-Step Methodology of Zero Trust are application access and user access defined?

In which step of the Five-Step Methodology of Zero Trust are application access and user access defined?
  • A.Step 4: Create the Zero Trust Policy
  • B.Step 3: Architect a Zero Trust Network
  • C.Step 1: Define the Protect Surface
  • D.Step 5: Monitor and Maintain the Network
Explanation
Selected Answer: A In Step 4 you define the security policy based on the Kipling method, which is equivalent to defining user and application access. Step 2 is about defining the flow between users and application/data. Step 3 is about designing the solution and placing the firewalls for micro segmentation

Reference: examtopics_top_comment

Practice with progress tracking

Sign in to track wrong answers, get spaced-repetition reminders, and run timed exam mode.