View Mode
Q: 1
Which of the following is a valid action for a SaaS Security API Data Loss Prevention Rule?
Options
Q: 2
What is one business risk introduced by the use of legacy firewalls?
Options
Q: 3
When users are authenticated using SAML, what are the two most efficient ways of provisioning the users?
Options
Q: 4
How do Access Policies relate to the Application Segments and Application Segment Groups?
Options
Q: 5
Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?
Options
Q: 6
The Forwarding Profile defines which of the following?
Options
Q: 7
Which is an example of Inline Data Protection?
Options
Q: 8
How does a Zscaler administrator troubleshoot a certificate pinned application?
Options
Q: 9
An administrator needs to SSL inspect all traffic but one specific URL category. The administrator decides to create two policies, one to inspect all traffic and another one to bypass the specific category. What is the logical sequence in which they have to appear in the list?
Options
Q: 10
What is the preferred method for authentication to access oneAPI?
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE