Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Zscaler ZTCA Online Access

Page: 4 / 6
Total 75 questions

Zscaler Zero Trust Cyber Associate Questions and Answers

Question 13

What protects Personally Identifiable Information (PII) accidentally shared by a colleague to the entire company?

Options:

A.

SSL/TLS inspection.

B.

Verifying identity and context through a secure identity provider.

C.

Data Loss Prevention (out-of-band and inline).

D.

Virtual firewalls.

Question 14

What are the advantages that Zero Trust solutions offer over legacy network controls?

Options:

A.

Ensuring that a user is correctly authorized at the application.

B.

Delivering connectivity, regardless of network or location, but only for authorized and compliant requests.

C.

By connecting an initiator to a cloud network-gateway edge and then routing the user traffic over internal networks.

D.

Layering in IP-level ACLs, which can require thousands of rules for modern web applications that are constantly adding new source IPs.

Question 15

Sometimes authorized and allowed initiators may request malicious access to services. What would be the best policy enforcement for an enterprise?

Options:

A.

Allow access only during business hours.

B.

Allow untethered access.

C.

Conditionally block (Deceive).

D.

Conditionally allow access and have a resource from Network Security review based on logs later.

Question 16

A Zero Trust policy enablement and subsequent application connection should always be permanent.

Options:

A.

True

B.

False

Page: 4 / 6
Total 75 questions