What are two steps in this process?

A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.

What are two steps in this process? (Choose two.)
A . Validate user identities through authentication
B . Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall
C . Categorize data and applications by levels of sensitivity
D . Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls

Answer: A,C

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments