Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks Exam PSE-Strata Topic 1 Question 99 Discussion

Actual exam question for Palo Alto Networks's PSE-Strata exam
Question #: 99
Topic #: 1
[All PSE-Strata Questions]

Within the Five-Step Methodology of Zero Trust, in which step would application access and user access be defined?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Oren
1 days ago
I'm not sure, but I think it could also be Step 3: Architect a Zero Trust Network, as that's where the network architecture is designed.
upvoted 0 times
...
Melda
4 days ago
Ha! I bet the exam writers threw in those other steps just to confuse us. As if the Five-Step Methodology wasn't complicated enough already.
upvoted 0 times
...
Jerilyn
5 days ago
I agree with Melynda, Step 4 makes sense because that's where the policies are created to define access.
upvoted 0 times
...
Abel
8 days ago
I was leaning towards D. Step 1: Define the Protect Surface, but now I'm not so sure. Doesn't that step focus more on identifying the critical assets to protect?
upvoted 0 times
...
Rosio
9 days ago
Hmm, I think the correct answer is C. Step 4: Create the Zero Trust Policy. That's where you define the access controls and policies for users and applications, right?
upvoted 0 times
...
Melynda
15 days ago
I think application access and user access would be defined in Step 4: Create the Zero Trust Policy.
upvoted 0 times
...

Save Cancel