Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Zero Trust access can work over any type of network.

A.

True

B.

False

What facilitates constant and uniform application of policy enforcement?

A.

Open and clear communication channels across Network and Security teams.

B.

The policy remains the same, conditionally, and is applied equally regardless of the location of the enforcement point.

C.

Leveraging policy enforcement capabilities available through traditional security appliances.

D.

Application access happens on-premises, typically either from within the data center or the corporate campus, where large security stacks are deployed.

The Zscaler Client Connector is:

A.

A device used to create a secure communication channel with a Web Application Firewall (WAF).

B.

A cloud-managed endpoint device via an MDM solution.

C.

An agent installed on the endpoint to tunnel authorized user traffic to the Zero Trust Exchange for protection of SaaS, private applications, and internet-bound traffic.

D.

A marketplace platform that connects different types of business clients to each other.

Data center applications are moving to:

A.

The branch.

B.

Castle and moat type architectures.

C.

The DMZ.

D.

The cloud.

Which of the following actions can be included in a conditional “block” policy? (Select 2)

A.

Quarantine: Ensure access is stopped and assessed.

B.

Deceive: Direct any malicious attack to a restricted decoy.

C.

Firehose: Send TCP resets to the initiator.

D.

Allow the connection.

The only way to deploy inspection is to inspect all traffic. Technically speaking, at an architectural level, there is no way to have exceptions, such as for certain websites or for certain types of applications.

A.

True

B.

False

What are the advantages that Zero Trust solutions offer over legacy network controls?

A.

Ensuring that a user is correctly authorized at the application.

B.

Delivering connectivity, regardless of network or location, but only for authorized and compliant requests.

C.

By connecting an initiator to a cloud network-gateway edge and then routing the user traffic over internal networks.

D.

Layering in IP-level ACLs, which can require thousands of rules for modern web applications that are constantly adding new source IPs.

Is risk the same across users?

A.

Yes.

B.

No.

What are the three main sections that the elements of Zero Trust are grouped into?

A.

Verify Identity and Context, Control Content and Access, and Enforce Policy.

B.

VPNs, firewalls, and legacy architectures.

C.

Castle-and-moat security architectures, with the data center and inbound DMZ being key.

D.

Routers, switches, and wireless access points.

In a Zero Trust architecture, what is required to apply the first levels of control policy decisions?

A.

Inspection of SSL/TLS connections.

B.

Local breakout so that traffic goes directly to SaaS applications from branches.

C.

Context and Identity.

D.

Segmenting an OT network so that it is air-gapped from the IT environment.