Question 6 of 52

In a LDAP authentication flow, who requests the user credentials?

Answer

Suggested Answer

The suggested answer is D.

Question 7 of 52

A contractor is visiting an organization for a maintenance task. The administrator does not have a spare laptop to give them. How will the administrator secure access for the contractor?

Answer

Suggested Answer

The suggested answer is C.

Question 8 of 52

A security analyst is configuring Zscaler Data Loss Prevention (DLP) policies and wants to ensure that sensitive files are accurately identified and inspected. They ask about the methods Zscaler DLP uses to inspect files and detect potential data leaks. What are the three levels of inspection that Zscaler DLP employs to accurately identify and inspect files?

Answer

Suggested Answer

The suggested answer is A.

Question 9 of 52

How many rounds of analysis are performed on a sandboxed sample to determine its characteristics?

Answer

Suggested Answer

The suggested answer is A.

Question 10 of 52

How does Zscaler apply Tenant Restriction policies to cloud applications?

Answer

Suggested Answer

The suggested answer is A.