Zscaler for Users(EDU-200) Exam Questions Flashcards
(110 cards)
TLS inspection provides what functionality? (select 3)
- Validation of certificate and issuer
- Ability to decrypt and scan encrypted content
- Policy for which traffic should be inspected
What options for TLS inspection certificates are available? (select 2)
- Zscaler Root Certificate Authority
- Customer Root Certificate Authority
Do most organisations worldwide inspect 100% of all SSL/TLS encrypted traffic?
The reality is more nuanced - certain traffic exclusions for healthcare and financial websites may be required depending on the organisation’s choice - that is why the Zscaler platform can bypass SSL inspection for certain categories of websites. Furthermore certain types of latency sensitive traffic such as UCaaS should be bypassed, so organisations rarely inspect all traffic
In Zscaler Private Access Policy, which criteria can be used to control access? (select 3)
- SAML or SCIM Attribute
- Client connector posture and trusted network
- Client type
Why is SSL/TLS inspection critical in a security architecture?
85-90% of all internet traffic is SSL/TLS encrypted (including threats), as protocols such as HTTP/2 are only delivered over TLS;
SSL/TLS inspection allows you to inspect
In what way does Zscaler’s identity proxy enable authentication to SaaS applications?
Issuing SAML assertions
In order for Zscaler to enforce policy based on accessing devices, what method is best used by IDP’s to share info about a user’s accessing device?
SAML
What is the fastest way to change a user’s access entitlements?
Send different attributes via SCIM
What is used to detect if a SAML assertion was modified after being issued?
Options: XML, Digital Signatures, Attributes, Tokens
Digitial signatures
How does Zscaler Internet Access authenticate users? (select 3)
- SAML
- LDAP
- Hosted Database
How is a SAML assertion delivered to Zscaler?
Options:
The IdP sends it via an HTTP post directly to the SP via a backend API,
The SP sends it via an HTTP post directly to the IdP via a backend API,
The IdP sends it via the user’s browser to the SP,
The SP sends it via a trusted authority to the IdP
The IDP sends it via the user’s browser to the SP (Service Provider)
A Server group maps ___ to ___
App Connectors Groups to Application Segments
You want Zscaler client Connector to automatically redirect to your corporate SAML IDP on launch. Which installer options should you configure to do so? (Select 2)
- –cloudname
- –userDomain
You have datacentres in New York, San Francisco, London and Hong Kong. Each Datacentre hosts multiple applications, and all have internet connectivity. What is the Min number of App Connectors you should deploy for production?
8, 2 per DC
Where is the control to prevent a user from exiting Zscaler client connector?
In the application profile
Which services can coexist on an application segment?
Options:
* Isolation, Browser Access, and Inspection;
* RDP, SSH, and Inspection;
* Inspection, Isolation, and RDP;
* CIFS, RDP, and SSH
Isolation, Browser Access, and Inspection
Privileged Remote Access supports which protocols? (select 2)
- SSH
- RDP
When moving from an Explicit proxy to a tunneled/transparent proxy - what, if any effects will be seen on the client? (select 3)
- The client will always resolve DNS
- The client browser needs re-configuration
- Authenicated websites may no longer work
How often does the Zscaler client connector check for software updates?
Options: Every 2 hours, Every 6 hours, Every 12 hours, Every 24 hours
Every 2hrs
What benefits does a Zscalser Tunnel have over other forwarding mechanisms for Zscaler Client Connector?
Tunnel encapsulates traffic and authenticates to the Zero trust exchange
What mechanisms identifies the Zero Trust Exchange node to be used for Zscaler Tunnels?
The PAC file used in the application profile
What conditions exist for Trusted Network Detection?
DNS Search Domain, DNS Server, Hostname Resolution
Why is Z-Tunnel 2.0 superior to Z-Tunnel 1.0? (select 3)
- Provides a control channel to update
- Faster transport mechanism
- Enables cloud firewall
Which check guarantees identification of a corporate-managed device by the Zscaler Client Connector?
Client certs & non-exportable private key