Exam PSE Strata All QuestionsBrowse all questions from this exam
Question 74

In which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?

    Correct Answer: A

    In the Palo Alto Networks Five-Step Zero Trust Methodology, the identification of an organization's critical data, applications, assets, and services (DAAS) is a part of Step 1: Define the protect surface. This step involves determining what needs to be protected, which includes critical DAAS, setting the foundation for the subsequent steps in implementing a Zero Trust architecture.

Discussion
ArangoTopicsOption: A

Step 1: Asset Discovery and Prioritization https://docs.paloaltonetworks.com/best-practices/zero-trust-best-practices/zero-trust-best-practices/the-five-step-methodology/step-1-asset-discovery-and-prioritization