A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture. What are two steps in this process? (Choose two.)
A.
Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls.
B.
Categorize data and applications by levels of sensitivity.
C.
Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall.
D.
Validate user identities through authentication.
B and D. Zero Trust model is focused on users and applications.
https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/guides/zero-trust-overview
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
cb4251b
9 months, 3 weeks agock19
11 months, 3 weeks agokei_chige
1 year, 3 months agoclmt
1 year, 6 months agoArangoTopics
1 year, 10 months agoyet_another_user
1 year, 10 months agoyet_another_user
1 year, 10 months agoPanora_ND25
2 years, 5 months agomushi4ka
2 years, 7 months ago