Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is the purpose of the Zscaler Client Connector providing the authentication token to the Zscaler Client Connector Portal after it is received from Zscaler Internet Access?

A.

To bypass multifactor authentication (MFA) during the enrollment process

B.

To immediately grant the user access to Zscaler Private Access resources

C.

To enable the portal to register the user’s device and pass the registration to Zscaler Internet Access

D.

To share the authentication token with the SAML IdP to validate the user session

Which is an example of Inline Data Protection?

A.

Preventing the copying of a sensitive document to a USB drive.

B.

Preventing the sharing of a sensitive document in OneDrive.

C.

Analyzing a customer’s M365 tenant for security best practices.

D.

Blocking the attachment of a sensitive document in webmail.

Which list of protocols is supported by Zscaler for Privileged Remote Access?

A.

RDP, VNC and SSH

B.

RDP, SSH and DHCP

C.

SSH, DNS and DHCP

D.

RDP, DNS and VNC

Which Zscaler feature detects whether an intruder is accessing your internal resources?

A.

SandBox

B.

SSL Decryption Bypass

C.

Browser Isolation

D.

Deception

What is the name of the feature that allows the platform to apply URL filtering even when a Cloud APP control policy explicitly permits a transaction?

A.

Allow Cascading

B.

Allow and Quarantine

C.

Allow URL Filtering

D.

Allow and Scan

An administrator would like users to be able to use the corporate instance of a SaaS application. Which of the following allows an administrator to make that distinction?

A.

Out-of-band CASB

B.

Cloud application control

C.

URL filtering with SSL inspection

D.

Endpoint DLP

Fundamental capabilities needed by other services within the Zscaler Zero Trust Exchange are provided by which of these?

A.

Access Control Services

B.

Digital Experience Monitoring

C.

Cyber Security Services

D.

Platform Services

Which of the following secures all IP unicast traffic?

A.

Secure Shell (SSH)

B.

Tunnel with local proxy

C.

Enforce PAC

D.

Z-Tunnel 2.0

When a SAML IDP returns an assertion containing device attributes, which Zscaler component consumes the attributes first, for policy creation?

A.

Enforcement node

B.

Zscaler SAML SP

C.

Mobile Admin Portal

D.

Zero Trust Exchange

What Malware Protection setting can be selected when setting up a Malware Policy?

A.

Isolate

B.

Bypass

C.

Block

D.

Do Not Decrypt