exam questions

Exam PSE-SASE All Questions

View all questions & answers for the PSE-SASE exam

Exam PSE-SASE topic 1 question 10 discussion

Actual exam question from Palo Alto Networks's PSE-SASE
Question #: 10
Topic #: 1
[All PSE-SASE Questions]

In which step of the Five-Step Methodology of Zero Trust are application access and user access defined?

  • A. Step 4: Create the Zero Trust Policy
  • B. Step 3: Architect a Zero Trust Network
  • C. Step 1: Define the Protect Surface
  • D. Step 5: Monitor and Maintain the Network
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ahmaddaghes
9 months, 3 weeks ago
Application access and user access are defined in: 4. Create the Zero Trust Policy This step involves developing and enforcing policies that specify who can access what resources under what conditions, ensuring that access is granted based on the principle of least privilege.
upvoted 1 times
...
veryboringitstudent
11 months, 3 weeks ago
I believe this question needs to be reviewed: should be Step 2: Map and Verify Transactions https://docs.paloaltonetworks.com/best-practices/zero-trust-best-practices/zero-trust-best-practices/the-five-step-methodology/step-2-map-the-protect-surface-transaction-flows#id322db094-7ed0-4bcf-a663-58b450d1260c Step 2: Map and Verify Transactions Map the transactions between users, applications, and data, so that you can verify and inspect those transactions. Map: Which applications have access to which critical data. Which users have access to those applications. Which users and applications have access to which infrastructure. Step 4 is Implementation: https://docs.paloaltonetworks.com/best-practices/zero-trust-best-practices/zero-trust-best-practices/the-five-step-methodology/step-4-implementation#id8af03732-03e2-404a-9030-dfb63dfabffd
upvoted 1 times
...
zebrahead
1 year, 1 month ago
https://lightstream.io/the-5-step-model-to-implementing-zero-trust/
upvoted 1 times
...
Lapas
1 year, 7 months ago
I think the correct answer would be Step 2.
upvoted 2 times
...
hcir
1 year, 9 months ago
Selected Answer: A
In Step 4 you define the security policy based on the Kipling method, which is equivalent to defining user and application access. Step 2 is about defining the flow between users and application/data. Step 3 is about designing the solution and placing the firewalls for micro segmentation
upvoted 3 times
...
yet_another_user
1 year, 10 months ago
It is step 2, agree with Pretorian comment below. I guess this is a transfer error.
upvoted 2 times
...
NodummyIQ
1 year, 12 months ago
B. Step 3: Architect a Zero Trust Network In Step 3 of the Five-Step Methodology of Zero Trust, application access and user access are defined.
upvoted 1 times
...
Normio
2 years, 2 months ago
Shouldn't it be Step 3? Step 3 is design according to Palo Alto: Also, there is another question 50 which has step 4 as the solution. Why should they include two questions with the same answer?
upvoted 1 times
Pretorian
2 years, 1 month ago
It's actually "Step 2: Map and Verify Transactions" (not an option) from the document you shared: "Map the transactions between users, applications, and data, so that you can verify and inspect those transactions. Map: Which applications have access to which critical data. Which users have access to those applications. Which users and applications have access to which infrastructure."
upvoted 4 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago