Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks Exam PSE-Strata Topic 1 Question 99 Discussion

Actual exam question for Palo Alto Networks's PSE-Strata exam
Question #: 99
Topic #: 1
[All PSE-Strata Questions]

Within the Five-Step Methodology of Zero Trust, in which step would application access and user access be defined?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Solange
2 months ago
I'm going with C. It just makes the most sense to me. Step 4 is all about establishing the policies that enforce Zero Trust, including user and application access controls.
upvoted 0 times
Emily
16 days ago
I'm going with C too. It seems like the most logical choice for defining access controls.
upvoted 0 times
...
Kathrine
1 months ago
I think it's definitely C. That's where the user and application access is defined.
upvoted 0 times
...
Justine
1 months ago
I agree, C is the correct answer. Step 4 is where the Zero Trust policy is created.
upvoted 0 times
...
...
Oren
2 months ago
I'm not sure, but I think it could also be Step 3: Architect a Zero Trust Network, as that's where the network architecture is designed.
upvoted 0 times
...
Melda
2 months ago
Ha! I bet the exam writers threw in those other steps just to confuse us. As if the Five-Step Methodology wasn't complicated enough already.
upvoted 0 times
Julio
2 months ago
C) Step 4: Create the Zero Trust Policy
upvoted 0 times
...
Carey
2 months ago
A) Step 3: Architect a Zero Trust Network
upvoted 0 times
...
...
Jerilyn
2 months ago
I agree with Melynda, Step 4 makes sense because that's where the policies are created to define access.
upvoted 0 times
...
Abel
3 months ago
I was leaning towards D. Step 1: Define the Protect Surface, but now I'm not so sure. Doesn't that step focus more on identifying the critical assets to protect?
upvoted 0 times
Portia
1 months ago
B) Step 5. Monitor and Maintain the Network
upvoted 0 times
...
Dana
1 months ago
E) Step 2 Map the Protect Surface Transaction Flows
upvoted 0 times
...
Leota
1 months ago
C) Step 4: Create the Zero Trust Policy
upvoted 0 times
...
Bulah
2 months ago
A) Step 3: Architect a Zero Trust Network
upvoted 0 times
...
...
Rosio
3 months ago
Hmm, I think the correct answer is C. Step 4: Create the Zero Trust Policy. That's where you define the access controls and policies for users and applications, right?
upvoted 0 times
...
Melynda
3 months ago
I think application access and user access would be defined in Step 4: Create the Zero Trust Policy.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77