Zscaler
ZTCA
Q1:
What protects Personally Identifiable Information (PII) accidentally shared by a colleague to the entire company?
○
A
SSL/TLS inspection.○
B
Verifying identity and context through a secure identity provider.○
C
Data Loss Prevention (out-of-band and inline).○
D
Virtual firewalls.
Zscaler
ZTCA
Q2:
Policy enforcement in Zero Trust is assessed:
○
A
For all traffic from the initiating source.○
B
Only if the risk score is high.○
C
For authorized users only.○
D
For every access request.
Zscaler
ZTCA
Q3:
Zero Trust access can work over any type of network.
○
A
True○
B
False
Zscaler
ZTCA
Q4:
Verification of user and device identity is to be enabled for:
○
A
Any person who wants to connect to an enterprise-controlled application, including employees, third parties, and partners.○
B
Remote employees only.○
C
Untrusted third parties only.○
D
Employees connecting from unmanaged endpoint devices only.
Zscaler
ZTCA
Q5:
Risk within the Zero Trust Exchange is a dynamic value calculated to:
○
A
Be hashed, truncated, and stored in an obfuscated manner.○
B
Give visibility of risky activity and allow enterprises to set acceptable thresholds of risk.○
C
Provide access to the network.○
D
Reduce processing load by enabling low-risk traffic to bypass less critical inspections.