A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.
What are two steps in this process? (Choose two.)
A . Validate user identities through authentication
B. Gain visibility of and control over applications and functionality in the traffic flow using a port and protocol firewall
C. Categorize data and applications by levels of sensitivity
D. Prioritize securing the endpoints of privileged users because if non-privileged user endpoints are exploited, the impact will be minimal due to perimeter controls
Answer: A,C
Latest PSE Strata Dumps Valid Version with 62 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund