in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?
I bet the developers of this exam have a wicked sense of humor. They're probably sitting back, laughing at us as we struggle with this question. 'Define the protect surface?' More like 'Define the minefield' am I right?
I'm going with D. Defining the protect surface is the foundation of the whole process. It's like building a house - you gotta know what you're building before you can start putting up walls.
Rosendo
18 days agoAshlee
1 days agoLizette
22 days agoMa
12 hours agoDaniel
1 months agoMarget
4 days agoEmeline
1 months agoReena
2 days agoShawna
4 days agoMarica
5 days agoJose
2 months agoKaty
16 days agoClaudio
23 days agoGayla
25 days agoKasandra
1 months agoAlbina
2 months agoFrancoise
2 months agoWenona
2 months ago