Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which Zscaler forwarding mechanism creates a loopback address on the machine to forward the traffic towards Zscaler cloud?

A.

Enforced PAC mode

B.

ZTunnel - Packet Filter Based

C.

ZTunnel with Local Proxy

D.

ZTunnel - Route Based

Can URL Filtering make use of Cloud Browser Isolation?

A.

No. Cloud Browser Isolation is a separate platform.

B.

No. Cloud Browser Isolation is only a feature of Advanced Threat Defense.

C.

Yes. After blocking access to a site, the user can manually switch on isolation.

D.

Yes. Isolate is a possible Action for URL Filtering.

What does TLS Inspection for Zscaler Internet Access secure public internet browsing with?

A.

Storing connection streams for future customer review.

B.

Removing certificates and reconnecting client connection using HTTP.

C.

Intermediate certificates are created for each client connection.

D.

Logging which clients receive the original webserver certificate.

What method does Zscaler Identity Threat Detection and Response use to gather information about AD domains?

A.

Scanning network ports

B.

Running LDAP queries

C.

Analyzing firewall logs

D.

Packet sniffing

Client Connector forwarding profile determines how we want to forward the traffic to the Zscaler Cloud. Assuming we have configured tunnels (GRE or IPSEC) from locations, what is the recommended combination for on-trusted and off-trusted options?

A.

Tunnel v2.0 for on-trusted and tunnel v2.0 for off-trusted

B.

None for on-trusted and none for off-trusted

C.

None for on-trusted and tunnel v2.0 for off-trusted

D.

Tunnel v2.0 for on-trusted and none for off-trusted

What is the recommended minimum number of App connectors needed to ensure resiliency?

A.

2

B.

6

C.

4

D.

3

What mechanism identifies the ZIA Service Edge node that the Zscaler Client Connector should connect to?

A.

The IP ranges included/excluded in the App Profile

B.

The PAC file used in the Forwarding Profile

C.

The PAC file used in the Application Profile

D.

The Machine Key used in the Application Profile

Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?

A.

The Cloud Firewall includes Deep Packet Inspection, which detects protocol evasions and sends the traffic to the respective engines for inspection and handling.

B.

Zscaler Client Connector will prevent evasion on the endpoint in conjunction with the endpoint operating system’s firewall.

C.

As traffic usually is forwarded from an on-premise firewall, this firewall will handle any evasion and will make sure that the protocols are corrected.

D.

The Cloud Firewall includes an IPS engine, which will detect the evasion techniques and will just block the transactions as it is invalid.