The correct answer is A . In Zero Trust architecture, dynamic risk assessment produces decision-support outputs that help determine how each access request should be handled. Zscaler’s identity and policy guidance explains that policy decisions are made by evaluating factors such as the user, device, location, group, and more to determine which policies apply. This means the output of risk assessment is not a packet capture or an operational maintenance workflow; it is the contextual information used to classify the request and enforce the appropriate control outcome.
This aligns closely with the idea of categories, criteria, and insights attached to an access request. Categories help classify the transaction or destination, criteria define which conditions are being evaluated, and insights provide the context needed to allow, restrict, deceive, isolate, or block. By contrast, a full PCAP is a troubleshooting artifact, not a core policy output. Backup and restore processes are administrative operations, and ML-based application segmentation is a separate discovery or segmentation capability rather than the direct output of dynamic risk assessment. Therefore, the best Zero Trust answer is that dynamic risk assessment produces contextual outputs tied to each access request so policy enforcement can be precise and adaptive.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit