Q: 11
Zscaler Advanced Threat Protection (ATP) is a key capability within Zscaler Internet Access (ZIA),
protecting users against attacks such as phishing. Which of the following is NOT part of the ATP
workflow?
Options
Discussion
I'm not so sure, I thought D might be the odd one out here since preventing password-protected zip downloads could overlap with DLP rather than ATP. Maybe ATP isn't always used for those file controls? Could be wrong though.
Not totally sure but pretty sure it's B. That seems unrelated to security stuff in ATP, right?
Be respectful. No spam.
Q: 12
As technology that exists for a very long period of time, has URL Filtering lost its effectiveness?
Options
Discussion
Option A is right. URL filtering still matters a lot, especially as a first layer before heavier checks like sandboxing. Even with HTTPS, if you use SSL inspection, URL filtering works fine. Saw similar questions on practice tests.
Maybe D. With so much traffic using HTTPS now, URL filtering can't inspect the actual content unless SSL inspection is enabled. I think that makes it far less useful compared to before, so leaning toward D here. Anyone disagree?
Had something like this in a mock. URL filtering is still widely used as the first defense, especially with SSL inspection handling HTTPS. Picking A.
Not quite that simple, URL filtering still works even with HTTPS if you have SSL inspection set up. A
Be respectful. No spam.
Q: 13
What is a ZIA Sublocation?
Options
Discussion
C imo, since overlapping IPs often show up in network config issues, I thought sublocations were specifically for that type of segmentation. Not sure if that’s always the case but seemed like it from doc examples.
C tbh, saw similar phrasing in some practice exams and the official guide, so figured it's about overlapping IPs.
Is the question asking about the best definition or just any valid use of sublocations? Would impact if D is acceptable too.
Be respectful. No spam.
Q: 14
Assume that you have four data centers around the globe, each hosting multiple applications for your
users. What is the minimum number of App Connectors you should deploy?
Assume that you have four data centers around the globe, each hosting multiple applications for your
users. What is the minimum number of App Connectors you should deploy?
Options
Discussion
B makes sense because Zscaler recommends at least two App Connectors per data center, mainly for redundancy and high availability. If you just do one per DC (C), a failure takes that whole DC offline for ZPA access. Pretty sure B is the safe call, but I get why C looks tempting if you're thinking bare minimum.
C or B here. Is high availability required in the question? That would change if single vs multiple connectors.
Be respectful. No spam.
Q: 15
What is the purpose of a Microtunnel (M-Tunnel) in Zscaler?
Options
Discussion
D vs B but it's D. M-Tunnel is about internal app access, not just Microsoft services. B is tempting but doesn't fit ZPA's core use.
D, Only M-Tunnel sets up that secure connection straight to internal apps, fits what ZPA is designed for. The others are more about general client or cloud services access. Confident on D but open if I missed something.
Be respectful. No spam.
Q: 16
A user is accessing a private application through Zscaler with SSL Inspection enabled. Which
certificate will the user see on the browser session?
Options
Discussion
You'll see the Zscaler generated MITM Certificate. That's what shows up since Zscaler proxies and reissues the cert during SSL inspection. Similar question popped up in exam reports. D.
Be respectful. No spam.
Q: 17
An administrator would like users to be able to use the corporate instance of a SaaS application.
Which of the following allows an administrator to make that distinction?
Options
Discussion
Probably B here. Cloud application control is designed for this kind of scenario since it can enforce access tied to the company's specific SaaS tenant, not just general app access. I remember seeing practice questions stress this feature. Anyone see a reason to pick A instead?
Be respectful. No spam.
Q: 18
Zscaler forwards the server SSL/TLS certificate directly to the user's browser session in which
situation?
Options
Discussion
C makes sense here. When traffic is specifically exempted in SSL Inspection policy, Zscaler just passes the server's original cert to the browser instead of doing its usual re-encryption thing. D wouldn't really trigger this behavior, it's entirely about the policy config. Pretty sure on this but open if anyone sees it differently.
C or D? I see similar wording in practice dumps and always appreciate when the question is this clear. Nice one.
Be respectful. No spam.
Q: 19
What ports and protocols are forwarded to the Zero Trust Exchange when Zscaler Client Connector is
using Tunnel 2.0?
Options
Discussion
C makes sense for Tunnel 2.0 since it's full packet, all TCP/UDP and even ICMP.
Probably C. Tunnel 2.0 forwards all TCP, UDP, and ICMP so it covers more than just web or DNS traffic.
Be respectful. No spam.
Q: 20
What method does Zscaler Identity Threat Detection and Response use to gather information about
AD domains?
Options
Discussion
I thought it was A because port scanning can reveal AD services, so figured Zscaler might use that to map domains. But now reading this, maybe I'm mixing it up with network discovery tools. Anyone else pick A?
Its B, not A. Zscaler ITDR uses LDAP queries to pull AD info, it doesn't scan ports for this. Saw this method in the docs too. Pretty sure on this one.
Option A. Saw a similar question on a practice test about how Zscaler gathers AD info, pretty sure it's scanning ports.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2