Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Zscaler ZTCA Based on Real Exam Environment

Page: 5 / 6
Total 75 questions

Zscaler Zero Trust Cyber Associate Questions and Answers

Question 17

In a network secured with a stack of security appliances and firewalls, what happens when people want to work from outside the network?

Options:

A.

Networks get extended using VPNs.

B.

Users simply need a reliable Wi-Fi connection.

C.

Work from outside the network is not possible.

D.

A single sign-on solution can be leveraged to accomplish this.

Question 18

How is policy enforcement in Zero Trust done?

Options:

A.

As a binary decision of allow or block.

B.

Without trust, for example Zero Trust.

C.

Conditionally, in that an allow or a block will have additional controls assigned, for example Allow and isolate, or Block and Deceive.

D.

At the network level, by source IP.

Question 19

Which of the following actions can be included in a conditional “block” policy? (Select 2)

Options:

A.

Quarantine: Ensure access is stopped and assessed.

B.

Deceive: Direct any malicious attack to a restricted decoy.

C.

Firehose: Send TCP resets to the initiator.

D.

Allow the connection.

Question 20

What is the cause of performance issues for some VPN connections?

Options:

A.

A split tunnel VPN where you break out traffic destined for certain IP addresses to go direct.

B.

VPN vendors throttle network traffic on the overlay by default to reduce overhead on the VPN headend.

C.

Hairpinning cloud application traffic through a data center bottleneck.

D.

Interoperability issues between IPSec standards like IKEv1 and IKEv2.

Page: 5 / 6
Total 75 questions