Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS includes which of the following?

A.

Spyware Callback

B.

Anonymizers

C.

Cookie Stealing

D.

IRC Tunneling

What is the default timer in ZDX Advanced for web probes to be sent?

A.

1 minute

B.

10 minutes

C.

30 minutes

D.

5 minutes

What is the purpose of a Microtunnel (M-Tunnel) in Zscaler?

A.

To provide an end-to-end communication channel between ZCC clients

B.

To provide an end-to-end communication channel to Microsoft Applications such as M365

C.

To create an end-to-end communication channel to Azure AD for authentication

D.

To create an end-to-end communication channel to internal applications

What ports and protocols are forwarded to the Zero Trust Exchange when Zscaler Client Connector is using Tunnel 2.0?

A.

TCP ports 80, 443 and 8080 only.

B.

Any HTTP/HTTPS traffic as well as DNS.

C.

All TCP and UDP ports as well as ICMP traffic.

D.

All Web ports as well as FTP and SSH.

Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?

Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?

A.

Six - one per data center plus two for cold standby.

B.

Eight -two per data center.

C.

Four - one per data center.

D.

Sixteen - to support a full mesh to the other data centers.

What happens after the Zscaler Client Connector receives a valid SAML response from the Identity Provider (IdP)?

A.

The Zscaler Client Connector Portal authenticates the user directly.

B.

There is no need for further actions as the SAML is valid, access is granted immediately.

C.

The SAML response is sent back to the user’s device for local validation.

D.

Zscaler Internet Access validates the SAML response and returns an authentication token.

Which Advanced Threat Protection feature restricts website access by geographic location?

A.

Spyware Callback

B.

Botnet Protection

C.

Blocked Countries

D.

Browser Exploits

What transport mechanism will Zscaler Client Connector use to forward traffic to the Zero Trust Exchange when configured for Tunnel 2.0?

A.

Zscaler Client Connector will encapsulate the user's traffic in GRE tunnels to the ZTE.

B.

Zscaler Client Connector will encapsulate the user's traffic in IPSec tunnels to the ZTE.

C.

Zscaler Client Connector will encapsulate the user's traffic in dTLS/TLS tunnels to the ZTE.

D.

Zscaler Client Connector will encapsulate the user's traffic in HTTP Connect tunnels to the ZTE.

Zscaler Platform Services works upon unencrypted data from encrypted communications due to which of the following?

A.

Antivirus

B.

Tenant Restrictions

C.

Web Filtering

D.

TLS Inspection

Malware Protection inside HTTPS connections is performed using which parts of the Zero Trust Exchange?

A.

Deception creating decoy files for malware to discover.

B.

Application Segmentation of users to specific private applications.

C.

TLS Inspection decrypting traffic to compare signatures for known risks.

D.

Data Loss Protection comparing saved filenames for known risks.