What is the ZIA feature that ensures certain SaaS applications cannot be accessed from an unmanaged device?
Malware Protection inside HTTPS connections is performed using which parts of the Zero Trust Exchange?
Which Risk360 key focus area observes a broad range of event, security configurations, and traffic flow attributes?
Does the Access Control suite include features that prevent lateral movement?
Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?
Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?
How does a Zscaler administrator troubleshoot a certificate pinned application?
What is the default policy configuration setting for checking for Viruses?
What ports and protocols are forwarded to the Zero Trust Exchange when Zscaler Client Connector is using Tunnel 2.0?
An administrator needs to SSL inspect all traffic but one specific URL category. The administrator decides to create two policies, one to inspect all traffic and another one to bypass the specific category. What is the logical sequence in which they have to appear in the list?
What is the default timer in ZDX Advanced for web probes to be sent?
Can Notifications, based on Alert Rules, be sent with methods other than email?
Which of the following is a unified management console for internet and SaaS applications, private applications, digital experience monitoring and endpoint agents?
While troubleshooting a user's slow application access, can a ZDX administrator see degradations in Wi-Fi signal strength?
What are common delivery mechanisms for malware?
Which of the following methods can be used to notify an end-user of a potential DLP violation in Zscaler’s Workflow Automation solution?
What does Advanced Threat Protection defend users from?
Which Platform Service enables visibility into the headers and payload of encrypted transactions?
If you're migrating from an on-premises proxy, you will already have a proxy setting configured within the browser or within the system. With Tunnel Mode, the best practice is to configure what type of proxy configuration?
Which are valid criteria for use in Access Policy Rules for ZPA?
What does an Endpoint refer to in an API architecture?
Layered defense throughout an organization security platform is valuable because of which of the following?
What does the user risk score enable a user to do?
You recently deployed an additional App Connector to and existing app connector group. What do you need to do before starting the zpa-connector service?
How is the relationship between App Connector Groups and Server Groups created?
What conditions can be referenced for Trusted Network Detection?
For a deployment using both ZIA and ZPA set of services, what is the best authentication solution?
What is the main purpose of Sandbox functionality?
In which of the following SaaS apps can you protect data at rest via Zscaler's out-of-band CASB solution?
When configuring Applications to be monitored, what probe types can be created?
Which of the following components is installed on an endpoint to connect users to the Zero Trust Exchange regardless of their location - home, work, while traveling, etc.?
What happens after the Zscaler Client Connector receives a valid SAML response from the Identity Provider (IdP)?
A user is accessing a private application through Zscaler with SSL Inspection enabled. Which certificate will the user see on the browser session?
SSH use or tunneling was detected and blocked by which feature?
Which list of protocols is supported by Zscaler for Privileged Remote Access?
When configuring Zscaler Private Access, what is the function of the Server Group?
Which SaaS platform is supported by Zscaler's SaaS Security Posture Management (SSPM)?
What is the purpose of a Microtunnel (M-Tunnel) in Zscaler?