Which protocol allows users to configure a passwordless authentication method for their ZIdentity account?
The Zscaler for Users - Engineer (EDU-202) learning path consists of various solutions covered in eleven courses. Which of the following topics is out of scope for the Zscaler for Users - Engineer learning path?
What are the building blocks of App Protection?
Any Zscaler Client Connector (ZCC) App Profile must include which of the following?
How many rounds of analysis are performed on a sandboxed sample to determine its characteristics?
Which set of protocols was developed to provide the most secure passwordless authentication methods, using services such as Windows Hello and YubiKey?
How many apps and risk attributes can be monitored using Zscaler’s Shadow IT and Data Discovery feature?
Logging services exist in which part of the Zscaler architecture?
How does Zscaler apply Tenant Restriction policies to cloud applications?
Which connectivity service provides branches, on-premises data centers, and public clouds with fast and reliable internet access while enabling private applications with a direct-to-cloud architecture?