3 Months Free Update
3 Months Free Update
3 Months Free Update
When the Zscaler Client Connector launches, which portal does it initially interact with to understand the user's domain and identity provider (IdP)?
If you're migrating from an on-premises proxy, you will already have a proxy setting configured within the browser or within the system. With Tunnel Mode, the best practice is to configure what type of proxy configuration?
Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?
What does Zscaler Advanced Firewall support that Zscaler Standard Firewall does not?
Zscaler Data Protection supports custom dictionaries.
What actions can administrators take with these dictionaries to protect data in motion?
What transport mechanism will Zscaler Client Connector use to forward traffic to the Zero Trust Exchange when configured for Tunnel 2.0?
What is the default policy configuration setting for checking for Viruses?
Which proprietary technology does Zscaler use to calculate risk attributes dynamically for websites?
Which of the following components is installed on an endpoint to connect users to the Zero Trust Exchange regardless of their location - home, work, while traveling, etc.?
When filtering user access to certain web destinations what can be a better option, URL or Cloud Application filtering Policies?
Which of the following options will protect against Botnet activity using IPS and Yara type content analysis?
What is the scale used to represent a users Zscaler Digital Experience (ZDX) score?
Which Zscaler feature detects whether an intruder is accessing your internal resources?
Which of the following methods can be used to notify an end-user of a potential DLP violation in Zscaler’s Workflow Automation solution?
Which Advanced Threats policy can be configured to protect users against a credential attack?
How would an administrator retrieve the access token to use the Zscaler One API?
Which types of Botnet Protection are supplied by Advanced Threat Protection?
Which Risk360 key focus area observes a broad range of event, security configurations, and traffic flow attributes?
Which Zscaler forwarding mechanism creates a loopback address on the machine to forward the traffic towards Zscaler cloud?
Fundamental capabilities needed by other services within the Zscaler Zero Trust Exchange are provided by which of these?
Zscaler forwards the server SSL/TLS certificate directly to the user's browser session in which situation?
What mechanism identifies the ZIA Service Edge node that the Zscaler Client Connector should connect to?
Client Connector forwarding profile determines how we want to forward the traffic to the Zscaler Cloud. Assuming we have configured tunnels (GRE or IPSEC) from locations, what is the recommended combination for on-trusted and off-trusted options?
You've configured the API connection to automatically download Microsoft Information Protection (MIP) labels into ZIA; where will you use these imported labels to protect sensitive data in motion?
Which of the following connects Zscaler users to the nearest Microsoft 365 servers for a better experience?
What does TLS Inspection for Zscaler Internet Access secure public internet browsing with?
Which of the following is an open standard used to provide automatic updates of a user's group and department information?
A Import
B. LDAP Sync
C. SCIM
D. SAML
An organization has more than one ZIA instance, each on different clouds. The organization is using the same login domain for both and upon login users are given this menu in ZCC asking which cloud they would like to join. What steps could an Administrator take to avoid having this menu appear?
Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?
Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?