When users are authenticated using SAML, what are the two most efficient ways of provisioning the users?
How does a Zscaler administrator troubleshoot a certificate pinned application?
An organization has more than one ZIA instance, each on different clouds. The organization is using the same login domain for both and upon login users are given this menu in ZCC asking which cloud they would like to join. What steps could an Administrator take to avoid having this menu appear?
Which of the following is unrelated to the properties of 'Trusted Networks'?
Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?
Which list of protocols is supported by Zscaler for Privileged Remote Access?
What Malware Protection setting can be selected when setting up a Malware Policy?
What method does Zscaler Identity Threat Detection and Response use to gather information about AD domains?
An administrator needs to SSL inspect all traffic but one specific URL category. The administrator decides to create two policies, one to inspect all traffic and another one to bypass the specific category. What is the logical sequence in which they have to appear in the list?
According to the Zero Trust Exchange Functional Services Diagram, which services does Antivirus belong to?
Which Zscaler feature detects whether an intruder is accessing your internal resources?