exam questions

Exam PSE Strata All Questions

View all questions & answers for the PSE Strata exam

Exam PSE Strata topic 1 question 76 discussion

Actual exam question from Palo Alto Networks's PSE Strata
Question #: 76
Topic #: 1
[All PSE Strata Questions]

Within the Five-Step Methodology of Zero Trust, in which step would application access and user access be defined?

  • A. Step 1: Define the Protect Surface
  • B. Step 3: Architect a Zero Trust Network
  • C. Step 5: Monitor and Maintain the Network
  • D. Step 2: Map the Protect Surface Transaction Flows
  • E. Step 4: Create the Zero Trust Policy
Show Suggested Answer Hide Answer
Suggested Answer: E 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
76076a1
2 months, 3 weeks ago
D
upvoted 1 times
...
Jerar
7 months, 4 weeks ago
Answer D: Step 2 You have to MAP, to define the access https://docs.paloaltonetworks.com/best-practices/zero-trust-best-practices/zero-trust-best-practices/the-five-step-methodology
upvoted 1 times
...
Odorka222
9 months, 1 week ago
Selected Answer: E
important words are "app access" and "user access" https://docs.paloaltonetworks.com/best-practices/zero-trust-best-practices/zero-trust-best-practices/the-five-step-methodology/step-4-implementation#id8af03732-03e2-404a-9030-dfb63dfabffd
upvoted 3 times
...
Micutzu
9 months, 3 weeks ago
Selected Answer: E
The question it's when we are implementing and not when we are mapping.
upvoted 3 times
...
LostatSea
1 year, 6 months ago
Selected Answer: D
D, Map the transactions between users, applications, and data, so that you can verify and inspect those transactions. Map: Which applications have access to which critical data. Which users have access to those applications. Which users and applications have access to which infrastructure.
upvoted 2 times
...
ArangoTopics
1 year, 6 months ago
Selected Answer: D
In step 2 is defined: Which applications have access to which critical data, which users have access to those applications and which users and applications have access to which infrastructure. https://docs.paloaltonetworks.com/best-practices/zero-trust-best-practices/zero-trust-best-practices/the-five-step-methodology/step-2-map-the-protect-surface-transaction-flows Step four is the implementation of securty rules based on definitions of previous steps.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago