Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks Exam PSE-Strata Topic 1 Question 99 Discussion

Actual exam question for Palo Alto Networks's PSE-Strata exam
Question #: 99
Topic #: 1
[All PSE-Strata Questions]

Within the Five-Step Methodology of Zero Trust, in which step would application access and user access be defined?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Solange
30 days ago
I'm going with C. It just makes the most sense to me. Step 4 is all about establishing the policies that enforce Zero Trust, including user and application access controls.
upvoted 0 times
Kathrine
11 days ago
I think it's definitely C. That's where the user and application access is defined.
upvoted 0 times
...
Justine
21 days ago
I agree, C is the correct answer. Step 4 is where the Zero Trust policy is created.
upvoted 0 times
...
...
Oren
2 months ago
I'm not sure, but I think it could also be Step 3: Architect a Zero Trust Network, as that's where the network architecture is designed.
upvoted 0 times
...
Melda
2 months ago
Ha! I bet the exam writers threw in those other steps just to confuse us. As if the Five-Step Methodology wasn't complicated enough already.
upvoted 0 times
Julio
1 months ago
C) Step 4: Create the Zero Trust Policy
upvoted 0 times
...
Carey
1 months ago
A) Step 3: Architect a Zero Trust Network
upvoted 0 times
...
...
Jerilyn
2 months ago
I agree with Melynda, Step 4 makes sense because that's where the policies are created to define access.
upvoted 0 times
...
Abel
2 months ago
I was leaning towards D. Step 1: Define the Protect Surface, but now I'm not so sure. Doesn't that step focus more on identifying the critical assets to protect?
upvoted 0 times
Portia
22 days ago
B) Step 5. Monitor and Maintain the Network
upvoted 0 times
...
Dana
23 days ago
E) Step 2 Map the Protect Surface Transaction Flows
upvoted 0 times
...
Leota
24 days ago
C) Step 4: Create the Zero Trust Policy
upvoted 0 times
...
Bulah
29 days ago
A) Step 3: Architect a Zero Trust Network
upvoted 0 times
...
...
Rosio
2 months ago
Hmm, I think the correct answer is C. Step 4: Create the Zero Trust Policy. That's where you define the access controls and policies for users and applications, right?
upvoted 0 times
...
Melynda
2 months ago
I think application access and user access would be defined in Step 4: Create the Zero Trust Policy.
upvoted 0 times
...

Save Cancel