When using a Domain Joined posture element to allow access in a ZPA Access Policy, which statement is true?
How many key engines does the Zscaler Firewall Module have?
In an LDAP authentication flow, who requests the user credentials?
An IT administrator is reviewing the recently configured ZDX module in their environment and checks the performance data on the dashboard. The administrator notices that no software inventory has populated. What could be a probable reason?
Customers would like to use a PAC file to forward web traffic to a Subcloud. Which one below uses the correct variables for the required PAC file?
What type of data would be protected by using Zscaler Indexed Document Matching (IDM)?
An organization wants to upload internal PII (personally identifiable information) into the Zscaler cloud for blocking without fear of compromise. Which of the following technologies can be used to help with this?
When making API calls into a Zscaler environment, which component is the administrator communicating with?