New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which SaaS platform is supported by Zscaler's SaaS Security Posture Management (SSPM)?

A.

Amazon S3

B.

Webex Teams

C.

Dropbox

D.

Google Workspace

Can URL Filtering make use of Cloud Browser Isolation?

A.

No. Cloud Browser Isolation is a separate platform.

B.

No. Cloud Browser Isolation is only a feature of Advanced Threat Defense.

C.

Yes. After blocking access to a site, the user can manually switch on isolation.

D.

Yes. Isolate is a possible Action for URL Filtering.

When filtering user access to certain web destinations what can be a better option, URL or Cloud Application filtering Policies?

A.

Cloud Application policies provide better access control.

B.

URL filtering policies provide better access control.

C.

Wherever possible URL policies are recommended.

D.

Both provide the same filtering capabilities.

What does TLS Inspection for Zscaler Internet Access secure public internet browsing with?

A.

Storing connection streams for future customer review.

B.

Removing certificates and reconnecting client connection using HTTP.

C.

Intermediate certificates are created for each client connection.

D.

Logging which clients receive the original webserver certificate.

Which of the following scenarios would generate a “Patient 0” alert?

A.

Zscaler's AI/ML based Smart Browser Isolation was triggered due to a users accessing a newly-registered domain.

B.

A new malicious file was detected by the sandbox due to an “allow and scan” First-Time Action in the sandbox policy.

C.

A new malicious file was detected by the sandbox due to an “quarantine” First-Time Action in the sandbox policy.

D.

Zscaler detected a HIPAA violation with in-band Data Protection scanning.

Which Zscaler feature detects whether an intruder is accessing your internal resources?

A.

SandBox

B.

SSL Decryption Bypass

C.

Browser Isolation

D.

Deception

Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?

A.

The Cloud Firewall includes Deep Packet Inspection, which detects protocol evasions and sends the traffic to the respective engines for inspection and handling.

B.

Zscaler Client Connector will prevent evasion on the endpoint in conjunction with the endpoint operating system’s firewall.

C.

As traffic usually is forwarded from an on-premise firewall, this firewall will handle any evasion and will make sure that the protocols are corrected.

D.

The Cloud Firewall includes an IPS engine, which will detect the evasion techniques and will just block the transactions as it is invalid.