New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is the ZIA feature that ensures certain SaaS applications cannot be accessed from an unmanaged device?

A.

Tenant Restriction

B.

Identity Proxy

C.

Out-of-band Application Access

D.

SaaS Application Access

The Forwarding Profile defines which of the following?

A.

Fallback methods and behavior when a DTLS tunnel cannot be established

B.

Application PAC file location

C.

System PAC file when off trusted network

D.

Fallback methods and behavior when a TLS tunnel cannot be established

What conditions can be referenced for Trusted Network Detection?

A.

Hostname Resolution, Network Adapter IP, Default Gateway

B.

DNS Servers, DNS Search Domain, Network Adapter IP

C.

Hostname Resolution, DNS Servers, Geo Location

D.

DNS Search Domain, DNS Server, Hostname Resolution

Which of the following statements most accurately describes Zero Trust Connections?

A.

They require that SSH inspection be enabled.

B.

They are dependent on a fixed / static network environment.

C.

They are independent of any network for control or trust.

D.

They require IPV6.

What is the main purpose of Sandbox functionality?

A.

Block malware that we have previously identified

B.

Build a test environment where we can evaluate the result of policies

C.

Identify Zero-Day Threats

D.

Balance thread detection across customers around the world

You've configured the API connection to automatically download Microsoft Information Protection (MIP) labels into ZIA; where will you use these imported labels to protect sensitive data in motion?

A.

Creating a custom DLP Dictionary

B.

Creating a SaaS Security Posture Control Policy.

C.

Creating a File Type Control Policy.

D.

Creating a custom DLP Policy.

Which type of malware is specifically used to deliver other malware?

A.

RAT

B.

Maldocs

C.

Downloaders

D.

Exploitation tool

When the Zscaler Client Connector launches, which portal does it initially interact with to understand the user's domain and identity provider (IdP)?

A.

Zscaler Private Access (ZPA) Portal

B.

Zscaler Central Authority

C.

Zscaler Internet Access (ZIA) Portal

D.

Zscaler Client Connector Portal

How is the relationship between App Connector Groups and Server Groups created?

A.

The relationship between Agp_ Connector Groups and Server Groups is established dynamically in the Zero Trust Exchange as users try to access Applications

B.

When a new Server Group is created it points to the Agp_ Connector Groups that provide visibility to this Server Group

C.

Both Agg Connector Groups and Server Groups are linked together via the Data Center element

D.

When you create a new Agg Connector Group you must select the list of Server Groups to which it provides visibility

What is the primary function of the on-premises VM in the EDM process?

A.

To local analyze cloud transactions for potential PII exfiltration.

B.

To replicate sensitive data across all organizational servers.

C.

To automate the indexing process by creating hashes for structured data elements.

D.

To store sensitive data securely and prevent unauthorized data access.