Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Zscaler Zero Trust Associate ZTCA Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

In a network secured with a stack of security appliances and firewalls, what happens when people want to work from outside the network?

Options:

A.

Networks get extended using VPNs.


B.

Users simply need a reliable Wi-Fi connection.


C.

Work from outside the network is not possible.


D.

A single sign-on solution can be leveraged to accomplish this.


Expert Solution
Questions # 2:

As a part of the first section of Zero Trust, Verify Identity, we understand the who, the what, and the where, in order to:

Options:

A.

Revoke network access to unauthorized users, devices, and workloads.


B.

Provide a secure set of controls for the initiator, requiring the initiator to go through layers of validation as they attempt to access an application.


C.

Provide proper billing by counting the number of deployed end users within a customer’s environment.


D.

Provide disaster recovery and business continuity in a “black swan” event context.


Expert Solution
Questions # 3:

A Zero Trust solution must account for an enterprise’s risk tolerance via:

Options:

A.

Industry analyst firms such as Gartner and Forrester should provide the best guidance.


B.

A Zero Trust certification process, whereby every employee at the company is Zero Trust certified.


C.

A dynamic risk score, which feeds into a decision engine that determines whether access should be granted.


D.

The enterprise security architecture team should create a standard formula to calculate a fixed risk score for each unique initiator based on previous security incidents.


Expert Solution
Questions # 4:

If you take a database from your data center and move it into the cloud, one of the legacy mechanisms for providing access is to: (Select 2)

Options:

A.

Create an inbound listener so that anyone from any network can egress via the internet and get access.


B.

Create a physical Ethernet cable between the data center and the cloud service provider.


C.

Configure the database server with a public IP and allow direct access via the internet.


D.

Extend an MPLS link to create a backhaul link to the cloud, creating an IP-routable network.


Expert Solution
Questions # 5:

What is the security risk inherent in creating a split tunnel VPN, where some traffic is routed over the VPN tunnel and the rest over a direct internet connection?

Options:

A.

The VPN traffic is exempted from any security policies configured on the direct internet uplink router or appliance.


B.

You no longer have the visibility required to make decisions on those traffic flows that are going directly out to the internet.


C.

A split ACL list, which means only half the rules will be enforced.


D.

An issue between the built-in client VPN agent on most modern operating systems and a third-party VPN gateway upstream.


Expert Solution
Questions # 6:

Zero Trust is about controlling initiator access. This is based on validating the identity of the user, and that is the sole attribute used to control access.

Options:

A.

True


B.

False


Expert Solution
Questions # 7:

Why have traditional networks relied on implicit trust to connect initiators to workloads?

Options:

A.

Security breaches were historically less frequent.


B.

TCP/IP, the foundation of most networks, inherently favors connectivity over trust.


C.

It was easier to create direct P2P links between all devices, providing connectivity for rapid-downloading applications like BitTorrent and file sharing.


D.

Layer 3 ACLs are sufficient for blocking untrusted initiators.


Expert Solution
Questions # 8:

Third parties that can be integrated at the point of Verifying Identity and Context in the Zero Trust process include:

Options:

A.

Open-source SIEM tools such as OSSM and the ELK Stack.


B.

IdPs (Identity Providers) such as Okta and PingFederate, which are used for SSO (Single Sign-On).


C.

Web scalers such as GCP, Azure, and AWS, where cloud workloads are typically hosted.


D.

Data center providers such as Equinix, where customer hardware is typically hosted.


Expert Solution
Questions # 9:

How is risky behavior controlled in a Zero Trust architecture?

Options:

A.

Permanent quarantining of devices in a particular VLAN.


B.

Re-categorization of an initiator, and their organization, so that subsequent access requests are limited, deceived, or stopped.


C.

Logging violations in a public database.


D.

Deploying best-in-class security appliances.


Expert Solution
Questions # 10:

There are alternative traffic forwarding methods to the Client Connector that leverage edge forwarding protocols to connect sites to the Zero Trust Exchange. Two of these protocols are:

Options:

A.

IPSec and GRE.


B.

Single Sign-On and Public Cloud Access.


C.

Security Appliance and Router.


D.

IPSec and IKEv2.


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions