Exam 202 (PDF) - CliffsNotes
Exam 202 (PDF) - CliffsNotes
___
Lessons
Exam
You have passed the test!
65 of 65 questions answered
Hide Answers
Your score:
Question 1: Correct answer
55 of 65 Correct (84%)
What are the different Alerting Criteria available in ZDX?
Elapsed time:
Application, Device, Network, and ZDX Score
56 minutes
Device, Protocol, User Experience, and Web Probe
Web Probe, Cloud Path Probes, DNS, and TCP Timeout
CPU, DNS, ZDX Score, and RUM
Different profiles can be provided for Employees vs contractors to provide different levels of ac
certain Cloud Applications
Tenancy Restrictions permit full access to anyone logged in via Client Connector.
Tenancy Restrictions ensures that employees do not access websites that are not deemed safe.
Tenancy Restrictions utilizes Advanced Firewall policies to dictate traffic flows.
Question 7: Correct answer
How many Virtual Service Edge's can exist within one cluster?
4
8
16
32
All traffic is processed by the Private Internet Service Edge in the customer data center.
Policy based forwarding through the App Connector.
Content scanned by the Zero Trust Exchange.
Public IP of the App Connector.
Next
App Connector scans content against the DLP Engine.
True
False
True
False
Risk Score
Risk Aversion Policy
RISK avoidance engine
IDM
Question
email 18: Correct answer
Which functions
Secure ICAP does the Central Authority provide? (Select 3)
Stream logs to SIEM
Policy Management.
SMS text message
Authentication.
Logging of traffic.
Question 17: Correct answer
TheTerminates
Private
goal of Zscaler Access
Identity Connections.
Proxy is to prevent users from accessing your Cloud Applications unless
accessing
them via Zscaler.
Node Selection.
True
False
AI Ops Function
Next
AutoRCA
ChatZDX
Y-Engine
False
Physical Honeypot servers
Physical fake Active Directory Servers
Servers with intentionally weak passwords
1 minute
5 minutes
3 minutes
2 minutes
each other
an AWS server
a DMZ
the network
GRE Tunnel
IPSec Tunnel
80
Same as the port configured for the host URL in the Web Probe that it follows
443
None - ICMP will be automatically selected
True
False
Zscaler manages Private Service Edge's even though they are deployed in the customers data c
The customer manages the Private Service Edge including software updates.
They are unmanaged devices.
The end user manages Private Service Edge's.
Attackers are increasingly using sophisticated methods like newly registered domains or levera
Question 34: Correct
TXT/RR records of DNSanswer
to send encrypted information over a command and control channel.
What technology can help in protecting users from websites running never seen before malicious jav
With more reliance on publicly discovered DNS resolvers on the open Internet (e.g. Google at 8.8
probability of compromise is higher as many of these resolvers use open-source technologies.
Modern browsers like google chrome can block any malicious active content on any website.
Iterative DNS platforms tend to use next-gen firewalls, which by default have an allow access po
UDPBrowser
port 53.Isolation can be used to safely render websites through a pixelated stream eliminating
malicious javascript from executing.
When using local DNS servers on the LAN, one must assume compromise due to the complexity
Browsing
managing websites
hundreds of using a CLI of
thousands and telnet
DNS command
servers can be anenvironment.
in a distributed effective way to protect from mal
javascript.
Blocking URL categories like NOD & NRD can be enough to protect as legitimate popular website
Question 36: Correct answer
What is the "Cloud Effect" as it pertains to Cloud Sandbox?
The MD5 hash of a file deemed malicious from Sandbox or threat feeds is uploaded to the cloud
time any customer sees the same file it will be blocked.
File that has never been seen before is detonated in the Sandbox
Next
This is a URL filtering function
Occurs between the "Pre-Filtering" and "Behavioral Analysis" stages of Sandbox
Automatically forwarding traffic from all ports and protocols to Zscaler's proxy.
Automatically detecting web traffic (e.g. FTP, HTTPS) coming in on non-standard ports and forw
to
Zscaler's
An
access? proxy.
application
(Select
needs
2) totodifferentiate
only be accessed by corporate devices. What options
It is not possible a corporate device from a personal device.could be used to cont
Blocking
Corporatetraffic destined
Devices need toforbe
a web proxy. with Zscaler during enrollment.
registered
Turning
the firewall
Device Posture Checkintofor
a makeshift proxy,
Certificates in caseDirectory.
and Active the Zscaler cloud is down.
It is common for attackers to sometimes use non-standard ports for well known applications - e
running a web server on port 8999.
Non-standard ports are inherently easier to program web applications for.
Firewalls cannot detect traffic on non-standard ports.
Zscaler itself operates on non-standard ports, which has led to a shift in the industry to move tow
non-standard ports.
Provides extreme flexibility and granularity of DLP policy by not stopping processing at the firs
match
Next
Faster policy processing by sending multiple copies of the transactions to all DLP policies simult
It
Canworks
combine
the same
actions
as traditional
of other types
firewalls
of policies and DLP policies to affect the outcome
True
False
True
False
Question
Validate
47:SAML
Correct
data answer
with Zscaler error codes in the help portal
IDM (Indexed Document Match) allows organizations to do which of the following?
Next
Question 45: Correct answer
What role does the Zscaler Identity Proxy play, in enabling access control through Zscaler, to a cloud
application?
Acting as a web proxy that intercepts and inspects all cloud application authentication requests.
Ensure that the user is already signed into Zscaler before they are allowed to attempt to access
application.
Synchronizing the user identity and attributes between the Zscaler IdP and the cloud application I
Acting as the source IP for a cloud application that provides restricted access by IP.
Lock-picking
Question 52: Correct answer
A "ghost in the machine" scenario
What are the two probe types that are configured while configuring an application in the ZDX Admin
An attacker finding your attack surface
portal?
Next
HTML and Network Probes
MTR and HTTP POST Probes
Web Probe and Cloudpath Probes
Traceroute Probe and Network Auth Probes
Lower
your Page Risk Index Threshold
In Zscaler
Add
a URL
The user exception for that site under Advanced Threat Protection security exceptions
device
Create a SSLUser
The Zscaler Inspection
SAML DMpolicy for that site with the Action set to 'Do Not Inspect'
Disable Advanced Threat Protection
Question 54: Correct answer
Question 55: Correct answer
How are logs stored in Zscaler Internet Access?
Higher throughput
More rapid deployment
They are customer managed
They are multi-tenant
Through ethernet cables, similar to X-ray vision but applied in an ethernet frame context
The difference between a TLS1.0 and TLS1.1 connection, which can be the key to inspecting for d
SMTP
Webhooks Next
Delineating between IPv4 and IPv6 traffic
What's good and what's bad inside a connection, since most connections are encrypted, in order
understand if there is any malware coming in and/or if there's any sensitive data leaking out
API
Email
Question 63: Correct answer
What does the SSMA (Single Scan Multi Action) function provide Zscaler?
Super Scan Managed Action enables managed policies pushed through API's.
Single Scan Multi Action enables multiple engines to act on a payload at once, providing greate
scalability.
Server Scan Multiprocessor API allows for API based policy control.
Server Scan More Action function allows load sharing across Zscaler Enforcement Nodes.