New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

How does log streaming work in ZIA?

A.

NSS (Nanolog Streaming Service) opens a secure tunnel to the cloud. User access goes through the ZEN (Zscaler Enforcement Node). ZEN sends the logs to the cloud Nanolog for storage. Cloud Nanolog streams a copy of the log to NSS. NSS sends the log to the SIEM over the network.

B.

NSS opens a secure tunnel to the cloud. Cloud Nanolog streams a copy of the log to NSS. User access goes through the ZEN. ZEN sends the logs to the cloud Nanolog for storage. NSS sends the log to the SIEM over the network.

C.

User access goes through the ZEN (Zscaler Enforcement Node). NSS (Nanolog Streaming Service) opens a secure tunnel to the cloud. ZEN sends the logs to the cloud Nanolog for storage. Cloud Nanolog streams a copy of the log to NSS. NSS sends the log to the SIEM over the network.

D.

NSS opens a secure tunnel to the cloud. ZEN sends the logs to the cloud Nanolog for storage. User access goes through the ZEN. Cloud Nanolog streams a copy of the log to NSS. NSS sends the log to the SIEM over the network.

A customer requires 2 Gbps of throughput through the GRE tunnels to Zscaler. Which is the ideal architecture?

A.

Two primary and two backup GRE tunnels from internal routers with NAT enabled

B.

Two primary and two backup GRE tunnels from border routers with NAT disabled

C.

Two primary and two backup GRE tunnels from internal routers with NAT disabled

D.

Two primary and two backup GRE tunnels from border routers with NAT enabled

An organization needs to comply with regulatory requirements that mandate web traffic inspected by ZIA to be processed within a specific geographic region. How can Zscaler help achieve this compliance?

A.

By allowing traffic to bypass ZIA Public Service Edges and connect directly to the destination

B.

By creating a subcloud that includes only ZIA Public Service Edges within the required region

C.

By deploying local VPNs to ensure regional traffic compliance

D.

By dynamically allocating traffic to the closest Public Service Edge, regardless of the region

At which level of the Zscaler Architecture do the Zscaler APIs sit?

A.

Enforcement Plane

B.

Nanolog Cluster

C.

Central Authority

D.

Data Fabric

Any Zscaler Client Connector (ZCC) App Profile must include which of the following?

A.

Bypass Profile

B.

Forwarding Profile

C.

Authentication Profile

D.

Exception Profile

What capabilities within Zscaler External Attack Surface Management (EASM) are specifically designed to uncover and assess domains that are intentionally created to resemble your legitimate brand or websites?

A.

Fake Domains

B.

Mimic Domains

C.

Spoofing Domains

D.

Lookalike Domains

Which report provides valuable visibility and insight into end-user activity involving sensitive data on endpoints?

A.

Malware report

B.

Endpoint DLP report

C.

Data usage report

D.

Incidents report

When using a Domain Joined posture element to allow access in a ZPA Access Policy, which statement is true?

A.

Only some Linux operating systems have Domain Joined posture profile support in Zscaler.

B.

When a ZPA Browser Access client attempts to access an application, Zscaler can determine if that device is joined to a particular domain.

C.

If a 2nd domain and a sub-domain are needed in the Access Policy rule you must create a 2nd posture profile with the other domain and add it to the Access Policy.

D.

Zscaler ZPA can contact the IDP such as Azure AD out-of-band to verify if a device is joined to a particular domain.

What is the primary benefit of using a Custom Zscaler Connector for SaaS Application?

A.

Minimum set of required credentials to access the SaaS Application Tenants

B.

Temporary user credentials to access the SaaS Application Tenants

C.

Broad access to all SaaS Application Tenants across Microsoft and Google

D.

Full administrator credentials to access the SaaS Application Tenants

Which feature of Zscaler Private AppProtection provides granular control over user access to specific applications?

A.

Threat Intelligence integration

B.

Application segmentation

C.

Role-based access control

D.

User behavior analysis