Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Zscaler Zero Trust Associate ZTCA Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Assessing, calculating, and delivering a risk score is: (Select 2)

Options:

A.

An assessment of inline and out-of-band network traffic.


B.

A review of known configuration, and the absence of other configuration details, of cloud-hosted services in relation to best practices, industry standards, and compliance models to ensure misconfigurations, issues, and vulnerabilities are understood and highlighted.


C.

An assessment of the content, not just the connection, of services, so that malicious functions are not downloaded and protected information is not lost.


D.

Only focused on initiator context.


Expert Solution
Questions # 12:

Should policy enforcement apply to all traffic, including from authorized initiators?

Options:

A.

A true Zero Trust solution must never allow any access without authorization.


B.

No. It should only apply to unauthorized initiators.


C.

Unauthorized initiators are blackholed by default.


D.

Zero Trust allows all initiators to see the destination, regardless of role and responsibility.


Expert Solution
Questions # 13:

With the first stage, Verify, being about identity and context, the “who,” the “what,” and the “where,” the second stage of Zero Trust is about:

Options:

A.

Two-factor authentication.


B.

Controlling content and access.


C.

Seeing where the traffic is going, either an IaaS/PaaS destination or a SaaS destination.


D.

Analyzing various threat actors in the wild.


Expert Solution
Questions # 14:

The first step of verifying identity is the “who.” And “who” is not just who is the user, but also, in addition:

Options:

A.

The destination, who can also be a user.


B.

The device, and understanding what levels of access that device has.


C.

The type of bare-metal server that the packets traverse on their way to the destination.


D.

The IaaS destination that the user is connecting to.


Expert Solution
Questions # 15:

Data center applications are moving to:

Options:

A.

The branch.


B.

Castle and moat type architectures.


C.

The DMZ.


D.

The cloud.


Expert Solution
Questions # 16:

Content inspection of encrypted content at scale is widely available on most network-based security platforms, such as firewalls, to deploy.

Options:

A.

True


B.

False


Expert Solution
Questions # 17:

What are some of the outputs of dynamic risk assessment?

Options:

A.

Categories, criteria, and insights pertaining to each access request.


B.

A full PCAP of the inline data transfer.


C.

A backup and restore configuration process, run manually during a change window.


D.

An ML/AI-driven engine analyzing and determining application segments after wildcard domains are established.


Expert Solution
Questions # 18:

Which of the following actions can be included in a conditional “block” policy? (Select 2)

Options:

A.

Quarantine: Ensure access is stopped and assessed.


B.

Deceive: Direct any malicious attack to a restricted decoy.


C.

Firehose: Send TCP resets to the initiator.


D.

Allow the connection.


Expert Solution
Questions # 19:

What are the advantages that Zero Trust solutions offer over legacy network controls?

Options:

A.

Ensuring that a user is correctly authorized at the application.


B.

Delivering connectivity, regardless of network or location, but only for authorized and compliant requests.


C.

By connecting an initiator to a cloud network-gateway edge and then routing the user traffic over internal networks.


D.

Layering in IP-level ACLs, which can require thousands of rules for modern web applications that are constantly adding new source IPs.


Expert Solution
Questions # 20:

What is the cause of performance issues for some VPN connections?

Options:

A.

A split tunnel VPN where you break out traffic destined for certain IP addresses to go direct.


B.

VPN vendors throttle network traffic on the overlay by default to reduce overhead on the VPN headend.


C.

Hairpinning cloud application traffic through a data center bottleneck.


D.

Interoperability issues between IPSec standards like IKEv1 and IKEv2.


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions