Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?
During the authentication process while accessing a private web application, how is the SAML assertion delivered to the service provider?
What is the scale used to represent a users Zscaler Digital Experience (ZDX) score?
Zscaler Data Protection supports custom dictionaries.
What actions can administrators take with these dictionaries to protect data in motion?
Within ZPA, the mapping relationship between Connector Groups and Server Groups can best be defined as which of the following?
What enables zero trust to be properly implemented and enforced between an originator and the destination application?
Which attack type is characterized by a commonly used website or service that has malicious content like malicious JavaScript running on it?
From a user perspective, Zscaler Bandwidth Control performs traffic shaping and buffering on what direction(s) of traffic?
What is Zscaler's rotation policy for intermediate certificate authority certificates?
You've configured the API connection to automatically download Microsoft Information Protection (MIP) labels into ZIA; where will you use these imported labels to protect sensitive data in motion?
What does Zscaler Advanced Firewall support that Zscaler Standard Firewall does not?
An administrator needs to SSL inspect all traffic but one specific URL category. The administrator decides to create two policies, one to inspect all traffic and another one to bypass the specific category. What is the logical sequence in which they have to appear in the list?
An administrator wants to allow users to access a wide variety of untrusted URLs. Which of the following would allow users to access these URLs in a safe manner?
Zscaler Advanced Threat Protection (ATP) is a key capability within Zscaler Internet Access (ZIA), protecting users against attacks such as phishing. Which of the following is NOT part of the ATP workflow?
How would an administrator retrieve the access token to use the Zscaler One API?
Layered defense throughout an organization security platform is valuable because of which of the following?
Which of the following are correct request methods when configuring a URL filtering rule with a Caution action?
What does TLS Inspection for Zscaler Internet Access secure public internet browsing with?
When a SAML IDP returns an assertion containing device attributes, which Zscaler component consumes the attributes first, for policy creation?