Which of the following is a valid action for a SaaS Security API Data Loss Prevention Rule?
Malware Protection inside HTTPS connections is performed using which parts of the Zero Trust Exchange?
What does TLS Inspection for Zscaler Internet Access secure public internet browsing with?
Zscaler Platform Services works upon unencrypted data from encrypted communications due to which of the following?
Which of the following options will protect against Botnet activity using IPS and Yara type content analysis?
Which of the following is a common use case for adopting Zscaler’s Data Protection?
Which Advanced Threat Protection feature restricts website access by geographic location?
What does Zscaler Advanced Firewall support that Zscaler Standard Firewall does not?
Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?
Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?
Zscaler forwards the server SSL/TLS certificate directly to the user's browser session in which situation?
When filtering user access to certain web destinations what can be a better option, URL or Cloud Application filtering Policies?
A user has opened a support case to complain about poor user experience when trying to manage their AWS resources. How could a helpdesk administrator get a useful root cause analysis to help isolate the issue in the least amount of time?
What is the immediate outcome or effect when the Zscaler Office 365 One Click Rule is enabled?
Which SaaS platform is supported by Zscaler's SaaS Security Posture Management (SSPM)?
What is the name of the feature that allows the platform to apply URL filtering even when a Cloud APP control policy explicitly permits a transaction?
What is the scale used to represent a users Zscaler Digital Experience (ZDX) score?
For a deployment using both ZIA and ZPA set of services, what is the best authentication solution?
When a SAML IDP returns an assertion containing device attributes, which Zscaler component consumes the attributes first, for policy creation?
Can Notifications, based on Alert Rules, be sent with methods other than email?
Which of the following statements most accurately describes Zero Trust Connections?
The security exceptions allow list for Advanced Threat Protection apply to which of the following Policies?
If you're migrating from an on-premises proxy, you will already have a proxy setting configured within the browser or within the system. With Tunnel Mode, the best practice is to configure what type of proxy configuration?
Which of the following connects Zscaler users to the nearest Microsoft 365 servers for a better experience?