Which list of protocols is supported by Zscaler for Privileged Remote Access?
Which attack type is characterized by a commonly used website or service that has malicious content like malicious JavaScript running on it?
What does an Endpoint refer to in an API architecture?
How does a Zscaler administrator troubleshoot a certificate pinned application?
What does Zscaler Advanced Firewall support that Zscaler Standard Firewall does not?
Is SCIM required for ZIA?
As technology that exists for a very long period of time, has URL Filtering lost its effectiveness?
Which of the following methods can be used to notify an end-user of a potential DLP violation in Zscaler’s Workflow Automation solution?
Which Advanced Threat Protection feature restricts website access by geographic location?
According to the Zero Trust Exchange Functional Services Diagram, which services does Antivirus belong to?
What is the immediate outcome or effect when the Zscaler Office 365 One Click Rule is enabled?
Which of the following is a common use case for adopting Zscaler’s Data Protection?
Which Advanced Threats policy can be configured to protect users against a credential attack?
A user is accessing a private application through Zscaler with SSL Inspection enabled. Which certificate will the user see on the browser session?
What are the two types of Probe supported in ZDX?
If you're migrating from an on-premises proxy, you will already have a proxy setting configured within the browser or within the system. With Tunnel Mode, the best practice is to configure what type of proxy configuration?
Which Zscaler feature detects whether an intruder is accessing your internal resources?
What is the main purpose of Sandbox functionality?
What does a DLP Engine consist of?
How does Zscaler Risk360 quantify risk?
Which feature does Zscaler Client Connector Z-Tunnel 2.0 enable over Z-Tunnel 1.0?
Which of the following is an unsupported tunnel type?
When configuring an inline Data Loss Prevention policy with content inspection, which of the following are used to detect data, allow or block transactions, and notify your organization's auditor when a user's transaction triggers a DLP rule?
What is the scale used to represent a users Zscaler Digital Experience (ZDX) score?
From a user perspective, Zscaler Bandwidth Control performs traffic shaping and buffering on what direction(s) of traffic?
When configuring Zscaler Private Access, what is the function of the Server Group?
In support of data privacy about TLS/SSL inspection, when you subscribe to ZIA, you enter into what kind of agreement?
What is a ZIA Sublocation?
When filtering user access to certain web destinations what can be a better option, URL or Cloud Application filtering Policies?
Fundamental capabilities needed by other services within the Zscaler Zero Trust Exchange are provided by which of these?
The Security Alerts section of the Alerts dashboard has a graph showing what information?
What is the ZIA feature that ensures certain SaaS applications cannot be accessed from an unmanaged device?
SSH use or tunneling was detected and blocked by which feature?
Zscaler Data Protection supports custom dictionaries.
What actions can administrators take with these dictionaries to protect data in motion?
Which of the following is a valid action for a SaaS Security API Data Loss Prevention Rule?
Zscaler forwards the server SSL/TLS certificate directly to the user's browser session in which situation?