Zscaler ZTCA Answer Keys
Zscaler ZTCA Answer Keys
True.
False.
Data Loss Prevention capabilities for ensuring nothing good leaks out of the
organization.
any historical connections that have been made by the same user
No means - the only access possible is via a special daemon running within
the application space of the SaaS application itself.
What purpose do Data Loss controls serve? Select all that apply.
No. It's important to find a balance. The Zero trust solution should
give the enterprise the ability to implement inspection for any
application or destination. Although its strongly recommended, it's
up to the enterprise to decide where inspection is needed.
Identifying and proving the who value, that is - who is the initiating entity - is
usually a function of a government agency.
True.
False.
Malicious threats to the initiators, and the risks the enterprise has
with external services, like data loss and unauthorized service
usage.
The monthly bandwidth cost of a premium MPLS circuit, in order to hold the
ISP accountable with some sort of SLA.
Whether a VPN may still be required for certain legacy web applications or
third party contractor access, where due to certificate pinning and other
incompatibility issues a forward proxy solution cannot be leveraged.
True.
False.
SIEM
Firewall
VPN
IdP
In a Zero Trust architecture, should applications that you manage have any
exposed inbound listeners?
Inbound listener ports should only be accessible to those initiators
who are allowed access. All other access (and visibility) must be
denied.
Yes, allow anyone to connect to the listening service, just like having your
website on the Internet for anyone to connect with.
Yes, allow all inbound to any service, the firewall will protect the app.
Deliver universal control across the entire enterprise. Once assessed applies
to all traffic from that enterprise.
Located anywhere.
Zero Trust policy enforcement must include all verified attributes: identity;
access, content and risk controls, before allowing access.
True.
False.
True.
False.
A one time verification of Identity + the control of access, content and risk.
The initiator's network.
Yes. In fact if any element of the Zero Trust Exchange produces a negative
outcome, then the conditional block policy will be implemented.
Partially trusted depending on whether you maintain a proper audit log for
access.
True.
False.
The VPN routes the entire network from this client all the way to
the internal network, which typically goes into a DMZ environment,
putting the user on the network, creating a significant threat of
lateral movement.
The VPN provides highly secure and reliable access to the network for
authorized users only.
The VPN provides a faster connection than a direct connection over the
Internet.
True.
False.
Question 31: Correct answer
Expanded its scope to try to provide the proof for Fermat's last theorem.
What is the trend that is increasing security risk through legacy solutions
that drive network sprawl?
A spread out group of ACLs and firewall rules, with each firewall and VPN
appliance only enforcing a subset of the total rule list.
A desire to replace edge routers with SD-WAN boxes, which can leverage
multiple uplinks for active-active VPN failover.
Whether the traffic is being received from a tunnel such as GRE or IPSec.
The three main areas of focus within the first section of Zero Trust (Verify
Identity & Context) are:
(1) Who is the initiator, (2) What are the attributes of the
connection, and (3) Where is the initiator trying to go.
(1) Inspecting SSL traffic, (2) Having traffic exclusions for sensitive traffic
like healthcare and financial transactions, and (3) Implementing data loss
policies.
(1) Establishing a GRE/IPSec tunnel with the Zero Trust Exchange, (2)
Forwarding traffic by location, and (3) Implementing policies by location.
80% of web traffic or more is encrypted. Thus it is key that enterprises stop
all bad things.
A terminator.
An exterminator.
A destination.
At the edge.
Once a network connection is made with the Zero Trust Exchange, the
connection is _____ as the Zero Trust Exchange acts as a _______.
inspected, firewall.
permanent, cache.
If you take a database from your data center and move it into the cloud, one
of the legacy mechanisms for providing access is to: (Select 2)
A physical ethernet cable between the data center and the cloud service
provider.
Configuring the database server with a public IP and allowing direct access
via the Internet
Which of these are data exfiltration risks enterprises should be aware of?
(Select 3)
Extortion.
A network config that is frozen in time, with a backup and restore performed
at the exact moment of authentication.
A RADIUS server.
Google authentication.
A true Zero Trust solution must never allow any access without
authorization.
Zero Trust allows for all initiators to see the destination, regardless of role
and responsibility.
Question 48: Correct answer
What minimal conditional "allow controls" should exist in a true Zero Trust
solution?
Allow / Deny.
A DMZ that doubles in size and scope within a short period of time.
Applications moving from the data center to the cloud, along with
users increasingly being remote.
API integrations between the Zero Trust platform and the major
cloud providers.
Multi-factor authentication.
What does one need to effectively apply a policy decision under Zero Trust?
Risk within the Zero Trust Exchange is a dynamic value calculated to:
Reduce processing load by enabling low risk traffic to bypass less critical
inspections
Once content has been opened for inspection, which controls can now be
applied?
Data Loss: (a) Context and content aware DLP, (b) Data
classification (EDM, IDM, OCR), (c) Machine Learning Identification;
Threat Prevention: (a) Secure web gateway, (b) Cloud firewalling, (c)
Intrusion prevention, (d) Sandboxing; Visibility: (a) Cloud app
identification, (b) Shadow IT, (c) UEBA assessment.
All / Block.
Layer 2 filtering.
Local breakout so that traffic goes direct to SaaS applications from branches.
Allow direct access for on-site initiators and enforce authorization for remote
connections.
Allow direct access for connections from enterprise managed devices and
enforce authorization for unmanaged devices on-site or remote.
Data loss controls should be considered for both inline and out-of-band
traffic.
True.
False.
Universal control across the entire enterprise. Once assessed, risk applies to
all traffic from that enterprise.
SSL/TLS inspection.
Virtual firewalls.
The second part of a Zero Trust architecture after verifying identity and
context is:
Enforcing policy.
Microsegmentation.
How are services protected in a legacy scenario when they are discoverable
on the public Internet? (Select all the apply)
50%.
Over 80%.
Under 80%.
The initial section of Zero Trust, Verify Identity and Context, includes three
elements; the first is:
Who is connecting.
The first step of verifying identity is the who. And "who" is not just who is the
user, but also, in addition:
The type of bare metal server that the packets traverse on their way to the
destination.
There are three sections that make up a successful Zero Trust architecture;
(1) Verify Identity and Context, (2) Control Content and Access, and (3) -
Enforce Policy.
True.
False.
A path from initiator to the network must be put in place, e.g. VPN.
The only way to deploy inspection is that you must inspect all traffic -
technically speaking, at an architectural level, there is no way to have
exceptions, e.g. to certain websites or for certain types of applications.
True.
False.
Security through obscurity is key. Thus open any ports and services, so any
attackers get lost in the number of open services.
You cannot attack what you cannot see. Removing your attack
surface greatly improves an enterprises security posture.
Cloud services are reliable and provide all the necessary security by default.