Which of the following methods can be used to notify an end-user of a potential DLP violation in Zscaler’s Workflow Automation solution?
What enables zero trust to be properly implemented and enforced between an originator and the destination application?
When configuring a ZDX custom application and choosing Type: 'Network' and completing the configuration by defining the necessary probe(s), which performance metrics will an administrator NOT get for users after enabling the application?
Which list of protocols is supported by Zscaler for Privileged Remote Access?
When configuring Zscaler Private Access, what is the function of the Server Group?
What happens after the Zscaler Client Connector receives a valid SAML response from the Identity Provider (IdP)?
What is the default policy configuration setting for checking for Viruses?
Fundamental capabilities needed by other services within the Zscaler Zero Trust Exchange are provided by which of these?
Which of the following DLP Notification methods can be used to forward a copy of the data that triggered the DLP policy to the auditor?
How does a Zscaler administrator troubleshoot a certificate pinned application?
Which of the following statements most accurately describes Zero Trust Connections?
What is the immediate outcome or effect when the Zscaler Office 365 One Click Rule is enabled?
When filtering user access to certain web destinations what can be a better option, URL or Cloud Application filtering Policies?
For a deployment using both ZIA and ZPA set of services, what is the best authentication solution?
What is the ZIA feature that ensures certain SaaS applications cannot be accessed from an unmanaged device?
Which of the following components is installed on an endpoint to connect users to the Zero Trust Exchange regardless of their location - home, work, while traveling, etc.?
The security exceptions allow list for Advanced Threat Protection apply to which of the following Policies?
Which of the following is a feature of ITDR (Identity Threat Detection and Response)?
Within ZPA, the mapping relationship between Connector Groups and Server Groups can best be defined as which of the following?
Which Advanced Threats policy can be configured to protect users against a credential attack?
How do Access Policies relate to the Application Segments and Application Segment Groups?
When configuring an inline Data Loss Prevention policy with content inspection, which of the following are used to detect data, allow or block transactions, and notify your organization's auditor when a user's transaction triggers a DLP rule?
Which of the following is unrelated to the properties of 'Trusted Networks'?
Can Notifications, based on Alert Rules, be sent with methods other than email?
Which SaaS platform is supported by Zscaler's SaaS Security Posture Management (SSPM)?
An administrator would like users to be able to use the corporate instance of a SaaS application. Which of the following allows an administrator to make that distinction?
Which Zscaler feature detects whether an intruder is accessing your internal resources?
If you're migrating from an on-premises proxy, you will already have a proxy setting configured within the browser or within the system. With Tunnel Mode, the best practice is to configure what type of proxy configuration?