A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture. What are two steps in this process? (Choose two.)
A.
Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls.
B.
Categorize data and applications by levels of sensitivity.
C.
Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall.
D.
Validate user identities through authentication.
B and D. Zero Trust model is focused on users and applications.
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/guides/zero-trust-overview
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
cb4251b
1 year agock19
1 year, 2 months agokei_chige
1 year, 5 months agoclmt
1 year, 8 months agoArangoTopics
2 years agoyet_another_user
2 years, 1 month agoyet_another_user
2 years, 1 month agoPanora_ND25
2 years, 7 months agomushi4ka
2 years, 9 months ago