in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?
I bet the developers of this exam have a wicked sense of humor. They're probably sitting back, laughing at us as we struggle with this question. 'Define the protect surface?' More like 'Define the minefield' am I right?
I'm going with D. Defining the protect surface is the foundation of the whole process. It's like building a house - you gotta know what you're building before you can start putting up walls.
Rosendo
2 months agoKatina
1 months agoYolando
1 months agoCordelia
1 months agoAshlee
2 months agoLizette
2 months agoFrank
1 months agoEarnestine
1 months agoMa
2 months agoDaniel
3 months agoRosalyn
1 months agoHector
1 months agoMarget
2 months agoEmeline
3 months agoReena
2 months agoShawna
2 months agoMarica
2 months agoJose
3 months agoJacqueline
1 months agoMicah
1 months agoVicki
1 months agoFrancene
1 months agoKaty
2 months agoClaudio
2 months agoGayla
2 months agoKasandra
3 months agoAlbina
3 months agoFrancoise
3 months agoWenona
4 months ago