Exam4Training

in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization’s critical data, applications, assets, and services (DAAS) be identified?

in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization’s critical data, applications, assets, and services (DAAS) be identified?
A . Step 4. Create the Zero Trust policy.
B . Step 2: Map the transaction flows.
C . Step 3. Architect a Zero Trust network.
D . Step 1: Define the protect surface

Answer: D

Exit mobile version