New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is one business risk introduced by the use of legacy firewalls?

A.

Performance issues

B.

Reduced management

C.

Low costs

D.

Low licensing support

The Zscaler platform can protect against malicious files, URLs and content based on a number of criteria including reputation type. What type of checking is virus scanning?

A.

Malware protection

B.

File reputation

C.

SHA-256 hashing

D.

Site reputation

Which Risk360 key focus area observes a broad range of event, security configurations, and traffic flow attributes?

A.

External Attack Surface

B.

Prevent Compromise

C.

Data Loss

D.

Lateral Propagation

The Security Alerts section of the Alerts dashboard has a graph showing what information?

A.

Top 5 Malware Programs Detected

B.

Top 5 Viruses by Region

C.

Top 5 Threats by Systems Impacted

D.

Top 5 Unified Threat Yara Options

Client Connector forwarding profile determines how we want to forward the traffic to the Zscaler Cloud. Assuming we have configured tunnels (GRE or IPSEC) from locations, what is the recommended combination for on-trusted and off-trusted options?

A.

Tunnel v2.0 for on-trusted and tunnel v2.0 for off-trusted

B.

None for on-trusted and none for off-trusted

C.

None for on-trusted and tunnel v2.0 for off-trusted

D.

Tunnel v2.0 for on-trusted and none for off-trusted

An administrator needs to SSL inspect all traffic but one specific URL category. The administrator decides to create two policies, one to inspect all traffic and another one to bypass the specific category. What is the logical sequence in which they have to appear in the list?

A.

Both policies are incompatible, so it is not possible to have them together.

B.

First the policy for the exception Category, then further down the list the policy for the generic "inspect all."

C.

First the policy for the generic "inspect all", then further down the list the policy for the exception Category.

D.

All policies both generic and specific will be evaluated so no specific order is required.

Which of the following options will protect against Botnet activity using IPS and Yara type content analysis?

A.

Command and Control Traffic

B.

Ransomware

C.

Troians

D.

Adware/Spyware Protection

From a user perspective, Zscaler Bandwidth Control performs traffic shaping and buffering on what direction(s) of traffic?

A.

Outbound traffic is shaped. Inbound or localhost traffic is unshaped.

B.

Outbound or inbound traffic is shaped. Localhost traffic is unshaped.

C.

Inbound traffic is shaped. Outbound or localhost traffic is unshaped.

D.

Localhost traffic is shaped. Outbound or Inbound traffic is unshaped.

Which Platform Service enables visibility into the headers and payload of encrypted transactions?

A.

Policy Framework

B.

TLS Decryption

C.

Reporting and Logging

D.

Device Posture

What is Zscaler's rotation policy for intermediate certificate authority certificates?

A.

Certificates are rotated every 90 days and have a 180-day expiration.

B.

Lifetime certificates have no expiration date.

C.

Certificates are rotated every seven days and have a 14-day expiration.

D.

Certificates are issued dynamically and expire in 24 hours.