A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.
What are two steps in this process? (Choose two.)
A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.
What are two steps in this process? (Choose two.)
In the process of understanding their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture, categorizing data and applications by levels of sensitivity is crucial for identifying what needs protection and prioritizing security efforts (option B). Additionally, validating user identities through authentication is essential to ensuring that only authorized individuals have access to sensitive resources, which aligns with the fundamental principles of Zero Trust (option D).
D seems to be valid as well.
B and D. Zero Trust model is focused on users and applications. https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/guides/zero-trust-overview
it says select two but only D is the answer
Can't vote for 2 answers but B and D are correct
BD are correct
B and D 1, Zero Trust for users, 2, Zero Trust for applications 3, Zero Trust for infrastructure
two answer so B,D
Typo, B and D
answer B and B fit best