Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

ZTCA Questions and Answers

Question # 6

The first step of verifying identity is the “who.” And “who” is not just who is the user, but also, in addition:

A.

The destination, who can also be a user.

B.

The device, and understanding what levels of access that device has.

C.

The type of bare-metal server that the packets traverse on their way to the destination.

D.

The IaaS destination that the user is connecting to.

Full Access
Question # 7

Data center applications are moving to:

A.

The branch.

B.

Castle and moat type architectures.

C.

The DMZ.

D.

The cloud.

Full Access
Question # 8

By definition, Zero Trust connections are:

A.

Independent of any network for control or trust.

B.

Highly dependent on the network type, including whether that network is IPv4 or IPv6.

C.

Based purely on a network appliance, constrained by how much CPU may be available.

D.

Hairpinned through service chaining by an SD-WAN appliance.

Full Access
Question # 9

In a Zero Trust architecture, what is required to apply the first levels of control policy decisions?

A.

Inspection of SSL/TLS connections.

B.

Local breakout so that traffic goes directly to SaaS applications from branches.

C.

Context and Identity.

D.

Segmenting an OT network so that it is air-gapped from the IT environment.

Full Access
Question # 10

There are three sections that make up a successful Zero Trust architecture: (1) Verify Identity and Context, (2) Control Content and Access, and (3) ______.

A.

Integration with an SSO provider.

B.

SAML- and SCIM-based authentication for assessing posture.

C.

Enforce Policy.

D.

Data Loss Prevention.

Full Access
Question # 11

With the first stage, Verify, being about identity and context, the “who,” the “what,” and the “where,” the second stage of Zero Trust is about:

A.

Two-factor authentication.

B.

Controlling content and access.

C.

Seeing where the traffic is going, either an IaaS/PaaS destination or a SaaS destination.

D.

Analyzing various threat actors in the wild.

Full Access
Question # 12

The initial section of Zero Trust, Verify Identity and Context, includes three elements; the first is:

A.

Who is connecting.

B.

Device posture-based determinations of quarantine.

C.

Integration with third-party threat intelligence feeds.

D.

ML-based application discovery as part of a microsegmentation implementation.

Full Access
Question # 13

To effectively access any external SaaS application managed by others, one must be securely connected through:

A.

A dynamic and effective path, ensuring beneficial experience and performance for the initiator.

B.

A hardwired network connection.

C.

A perimeter-based stateful network firewall, such as a security appliance.

D.

No means; the only access possible is via a special daemon running within the application space of the SaaS application itself.

Full Access
Question # 14

The Zscaler Client Connector is:

A.

A device used to create a secure communication channel with a Web Application Firewall (WAF).

B.

A cloud-managed endpoint device via an MDM solution.

C.

An agent installed on the endpoint to tunnel authorized user traffic to the Zero Trust Exchange for protection of SaaS, private applications, and internet-bound traffic.

D.

A marketplace platform that connects different types of business clients to each other.

Full Access
Question # 15

What facilitates constant and uniform application of policy enforcement?

A.

Open and clear communication channels across Network and Security teams.

B.

The policy remains the same, conditionally, and is applied equally regardless of the location of the enforcement point.

C.

Leveraging policy enforcement capabilities available through traditional security appliances.

D.

Application access happens on-premises, typically either from within the data center or the corporate campus, where large security stacks are deployed.

Full Access
Question # 16

Zero Trust is about controlling initiator access. This is based on validating the identity of the user, and that is the sole attribute used to control access.

A.

True

B.

False

Full Access
Question # 17

If you take a database from your data center and move it into the cloud, one of the legacy mechanisms for providing access is to: (Select 2)

A.

Create an inbound listener so that anyone from any network can egress via the internet and get access.

B.

Create a physical Ethernet cable between the data center and the cloud service provider.

C.

Configure the database server with a public IP and allow direct access via the internet.

D.

Extend an MPLS link to create a backhaul link to the cloud, creating an IP-routable network.

Full Access
Question # 18

Businesses undertake ________ to increase efficiency, improve agility, and achieve a competitive advantage.

A.

Digital transformation journeys

B.

Blue teaming exercises

C.

Red teaming exercises

D.

Disaster recovery planning

Full Access
Question # 19

Verification of user and device identity is to be enabled for:

A.

Any person who wants to connect to an enterprise-controlled application, including employees, third parties, and partners.

B.

Remote employees only.

C.

Untrusted third parties only.

D.

Employees connecting from unmanaged endpoint devices only.

Full Access
Question # 20

Connections approved by the Zero Trust Exchange must then enable permanent network-level access for at least 30 days.

A.

True

B.

False

Full Access
Question # 21

Enterprises can deliver full security controls inline, without needing to decrypt traffic.

A.

True

B.

False

Full Access
Question # 22

When connecting to internal applications, something that you manage, what is the right way to implement Zero Trust for inbound connections?

A.

Direct access to internal applications must never be allowed. Furthermore, internal applications should never be exposed to any untrusted initiator and thus must be dark. Only authorized users can connect.

B.

Allow direct access for on-site initiators and enforce authorization for remote connections.

C.

Allow direct access for connections from enterprise-managed devices and enforce authorization for unmanaged devices, on-site or remote.

D.

Only allow connections via a secure point-to-point VPN connection.

Full Access