New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

How many apps and risk attributes can be monitored using Zscaler’s Shadow IT and Data Discovery feature?

A.

10K apps and 5 risk attributes

B.

30K apps and 80 risk attributes

C.

50K apps and 75 risk attributes

D.

100K apps and 200 risk attributes

Which Zscaler technology can be used to enhance your cloud data security by providing comprehensive visibility and management of data at rest within public clouds?

A.

Data Security Posture Management (DSPM)

B.

Cloud Sandbox

C.

Cloud Access Security Broker (CASB)

D.

SaaS Security Posture Management (SSPM)

The ZDX Dashboard is a comprehensive tool designed to provide a performance overview of an organization's digital experience. It encompasses various aspects to monitor and analyze performance, ensuring a smooth digital experience across the organization.

Which of the following is responsible for the automated root cause analysis within ZDX?

A.

OAuth request

B.

Application Performance

C.

Y-Engine

D.

Copilot

An organization wants to upload internal PII (personally identifiable information) into the Zscaler cloud for blocking without fear of compromise. Which of the following technologies can be used to help with this?

A.

Dictionaries

B.

Engines

C.

IDM

D.

EDM

Which authorization framework is used by OneAPI to provide secure access to Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), and Zscaler Client Connector APIs?

A.

JSON Web Tokens

B.

OAuth 2.0

C.

SAML

D.

API Keys

How many rounds of analysis are performed on a sandboxed sample to determine its characteristics?

A.

One static analysis, one dynamic analysis, and a second static analysis of all dropped files and artifacts from the dynamic analysis.

B.

As many rounds of analysis as the policy is configured to perform.

C.

Only a static analysis is performed.

D.

Only one static and one dynamic analysis is performed.

How can Zscaler ThreatParse, in conjunction with information about the MITRE ATTandCK framework, assist security analysts in determining the attacker's objectives?

A.

It conducts natural language reconstruction of attacks by summarizing and translating log information into plain English.

B.

It maps into the framework to evaluate the probability of a financial loss.

C.

It provides suggestions on risk management strategies provided by the framework.

D.

It prioritizes the log information according to the latest campaign in the MITRE ATTandCK framework.

How does Zscaler apply Tenant Restriction policies to cloud applications?

A.

By allowing unrestricted access to all cloud applications

B.

By blocking all external traffic

C.

By inserting headers with the appropriate information during authentication

D.

By disabling cloud applications completely