What is one business risk introduced by the use of legacy firewalls?
The Zscaler platform can protect against malicious files, URLs and content based on a number of criteria including reputation type. What type of checking is virus scanning?
Which Risk360 key focus area observes a broad range of event, security configurations, and traffic flow attributes?
The Security Alerts section of the Alerts dashboard has a graph showing what information?
Client Connector forwarding profile determines how we want to forward the traffic to the Zscaler Cloud. Assuming we have configured tunnels (GRE or IPSEC) from locations, what is the recommended combination for on-trusted and off-trusted options?
An administrator needs to SSL inspect all traffic but one specific URL category. The administrator decides to create two policies, one to inspect all traffic and another one to bypass the specific category. What is the logical sequence in which they have to appear in the list?
Which of the following options will protect against Botnet activity using IPS and Yara type content analysis?
From a user perspective, Zscaler Bandwidth Control performs traffic shaping and buffering on what direction(s) of traffic?
Which Platform Service enables visibility into the headers and payload of encrypted transactions?
What is Zscaler's rotation policy for intermediate certificate authority certificates?