When filtering user access to certain web destinations what can be a better option, URL or Cloud Application filtering Policies?
Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?
An administrator would like users to be able to use the corporate instance of a SaaS application. Which of the following allows an administrator to make that distinction?
When users are authenticated using SAML, what are the two most efficient ways of provisioning the users?
What enables zero trust to be properly implemented and enforced between an originator and the destination application?
Which Zscaler forwarding mechanism creates a loopback address on the machine to forward the traffic towards Zscaler cloud?
When a SAML IDP returns an assertion containing device attributes, which Zscaler component consumes the attributes first, for policy creation?
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS includes which of the following?
Which of the following components is installed on an endpoint to connect users to the Zero Trust Exchange regardless of their location - home, work, while traveling, etc.?
You've configured the API connection to automatically download Microsoft Information Protection (MIP) labels into ZIA; where will you use these imported labels to protect sensitive data in motion?
Which of the following DLP Notification methods can be used to forward a copy of the data that triggered the DLP policy to the auditor?
Which of the following options will protect against Botnet activity using IPS and Yara type content analysis?
What method does Zscaler Identity Threat Detection and Response use to gather information about AD domains?
Which of the following are correct request methods when configuring a URL filtering rule with a Caution action?
Which Advanced Threat Protection feature restricts website access by geographic location?
An administrator needs to SSL inspect all traffic but one specific URL category. The administrator decides to create two policies, one to inspect all traffic and another one to bypass the specific category. What is the logical sequence in which they have to appear in the list?
Which proprietary technology does Zscaler use to calculate risk attributes dynamically for websites?
Within ZPA, the mapping relationship between Connector Groups and Server Groups can best be defined as which of the following?
As technology that exists for a very long period of time, has URL Filtering lost its effectiveness?
The Security Alerts section of the Alerts dashboard has a graph showing what information?
During the authentication process while accessing a private web application, how is the SAML assertion delivered to the service provider?
What Malware Protection setting can be selected when setting up a Malware Policy?
Which Platform Service enables visibility into the headers and payload of encrypted transactions?
Which of the following is a valid action for a SaaS Security API Data Loss Prevention Rule?
What is the recommended minimum number of App connectors needed to ensure resiliency?
Which of the following is a feature of ITDR (Identity Threat Detection and Response)?
How would an administrator retrieve the access token to use the Zscaler One API?