Zscaler ZDTA
Q: 1
Which of the following is a valid action for a SaaS Security API Data Loss Prevention Rule?
Options
Q: 2
What is one business risk introduced by the use of legacy firewalls?
Options
Q: 3
When users are authenticated using SAML, what are the two most efficient ways of provisioning the
users?
Options
Q: 4
How do Access Policies relate to the Application Segments and Application Segment Groups?
Options
Q: 5
Does the Cloud Firewall detect evasion techniques that would allow applications to communicate
over non-standard ports to bypass its controls?
Options
Q: 6
The Forwarding Profile defines which of the following?
Options
Q: 7
Which is an example of Inline Data Protection?
Options
Q: 8
How does a Zscaler administrator troubleshoot a certificate pinned application?
Options
Q: 9
An administrator needs to SSL inspect all traffic but one specific URL category. The administrator
decides to create two policies, one to inspect all traffic and another one to bypass the specific
category. What is the logical sequence in which they have to appear in the list?
Options
Q: 10
What is the preferred method for authentication to access oneAPI?
Options
Question 1 of 10