Which Risk360 key focus area observes a broad range of event, security configurations, and traffic flow attributes?
What does Zscaler Advanced Firewall support that Zscaler Standard Firewall does not?
You've configured the API connection to automatically download Microsoft Information Protection (MIP) labels into ZIA; where will you use these imported labels to protect sensitive data in motion?
The Zscaler platform can protect against malicious files, URLs and content based on a number of criteria including reputation type. What type of checking is virus scanning?
If you're migrating from an on-premises proxy, you will already have a proxy setting configured within the browser or within the system. With Tunnel Mode, the best practice is to configure what type of proxy configuration?
Which SaaS platform is supported by Zscaler's SaaS Security Posture Management (SSPM)?
An organization has more than one ZIA instance, each on different clouds. The organization is using the same login domain for both and upon login users are given this menu in ZCC asking which cloud they would like to join. What steps could an Administrator take to avoid having this menu appear?
Which of the following is a valid action for a SaaS Security API Data Loss Prevention Rule?
How is the relationship between App Connector Groups and Server Groups created?
When filtering user access to certain web destinations what can be a better option, URL or Cloud Application filtering Policies?
Which Zscaler forwarding mechanism creates a loopback address on the machine to forward the traffic towards Zscaler cloud?
When users are authenticated using SAML, what are the two most efficient ways of provisioning the users?
What method does Zscaler Identity Threat Detection and Response use to gather information about AD domains?
What is the name of the feature that allows the platform to apply URL filtering even when a Cloud APP control policy explicitly permits a transaction?
What is Zscaler's rotation policy for intermediate certificate authority certificates?
Which of the following is an open standard used to provide automatic updates of a user's group and department information?
A Import
B. LDAP Sync
C. SCIM
D. SAML
Which feature does Zscaler Client Connector Z-Tunnel 2.0 enable over Z-Tunnel 1.0?
Which of the following components is installed on an endpoint to connect users to the Zero Trust Exchange regardless of their location - home, work, while traveling, etc.?
Zscaler Platform Services works upon unencrypted data from encrypted communications due to which of the following?
The Security Alerts section of the Alerts dashboard has a graph showing what information?
Can Notifications, based on Alert Rules, be sent with methods other than email?
When the Zscaler Client Connector launches, which portal does it initially interact with to understand the user's domain and identity provider (IdP)?
Zscaler Advanced Threat Protection (ATP) is a key capability within Zscaler Internet Access (ZIA), protecting users against attacks such as phishing. Which of the following is NOT part of the ATP workflow?
Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?
Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?
Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?