Zscaler Data Protection supports custom dictionaries.
What actions can administrators take with these dictionaries to protect data in motion?
A user has opened a support case to complain about poor user experience when trying to manage their AWS resources. How could a helpdesk administrator get a useful root cause analysis to help isolate the issue in the least amount of time?
What conditions can be referenced for Trusted Network Detection?
Malware Protection inside HTTPS connections is performed using which parts of the Zero Trust Exchange?
Which is an example of Inline Data Protection?
Which of the following components is installed on an endpoint to connect users to the Zero Trust Exchange regardless of their location - home, work, while traveling, etc.?
What does the user risk score enable a user to do?
An organization has more than one ZIA instance, each on different clouds. The organization is using the same login domain for both and upon login users are given this menu in ZCC asking which cloud they would like to join. What steps could an Administrator take to avoid having this menu appear?
According to the Zero Trust Exchange Functional Services Diagram, which services does Antivirus belong to?
What is the default timer in ZDX Advanced for web probes to be sent?
An administrator needs to SSL inspect all traffic but one specific URL category. The administrator decides to create two policies, one to inspect all traffic and another one to bypass the specific category. What is the logical sequence in which they have to appear in the list?
Which of the following is a unified management console for internet and SaaS applications, private applications, digital experience monitoring and endpoint agents?
What are the two types of Alert Rules that can be defined?
For a deployment using both ZIA and ZPA set of services, what is the best authentication solution?
What are the two types of Probe supported in ZDX?
The Security Alerts section of the Alerts dashboard has a graph showing what information?
The security exceptions allow list for Advanced Threat Protection apply to which of the following Policies?
What is the ZIA feature that ensures certain SaaS applications cannot be accessed from an unmanaged device?
Which type of malware is specifically used to deliver other malware?
Which of the following connects Zscaler users to the nearest Microsoft 365 servers for a better experience?
What is the scale used to represent a users Zscaler Digital Experience (ZDX) score?
What is the recommended minimum number of App connectors needed to ensure resiliency?
When users are authenticated using SAML, what are the two most efficient ways of provisioning the users?
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS includes which of the following?
What does Advanced Threat Protection defend users from?
Which of the following is unrelated to the properties of 'Trusted Networks'?
What is one of the four steps of a cyber attack?
In support of data privacy about TLS/SSL inspection, when you subscribe to ZIA, you enter into what kind of agreement?
Which are valid criteria for use in Access Policy Rules for ZPA?
What is Zscaler's rotation policy for intermediate certificate authority certificates?
Which type of attack plants malware on commonly accessed services?
Which of the following are correct request methods when configuring a URL filtering rule with a Caution action?
What does TLS Inspection for Zscaler Internet Access secure public internet browsing with?
How would an administrator retrieve the access token to use the Zscaler One API?
How is the relationship between App Connector Groups and Server Groups created?
Which of the following is a key feature of Zscaler Data Protection?
Which of the following statements most accurately describes Zero Trust Connections?