Spring Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the Zscaler Zero Trust Associate ZTCA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam ZTCA Premium Access

View all detail and faqs for the ZTCA exam


349 Students Passed

89% Average Score

92% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

A Zero Trust policy enablement and subsequent application connection should always be permanent.

Options:

A.

True

B.

False

Questions # 2:

What are two categories of destination applications in Zero Trust?

Options:

A.

(a) Known: the application has been categorized, classified, and updated dynamically; (b) Unknown: the application does not meet an existing category and must be profiled, learned, and controlled conditionally.

B.

(a) Google, (b) non-Google.

C.

(a) SaaS, (b) PaaS.

D.

(a) all things on the internet, (b) all things internal.

Questions # 3:

The Zscaler Zero Trust Exchange has:

Options:

A.

Inspection controls only in limited core sites.

B.

Locations in few high-traffic geographic regions.

C.

Scalable inspection solutions at 150+ public locations and locally in private locations.

D.

Expanded its scope to try to provide the proof for Fermat’s Last Theorem.

Questions # 4:

Should policy enforcement apply to all traffic, including from authorized initiators?

Options:

A.

A true Zero Trust solution must never allow any access without authorization.

B.

No. It should only apply to unauthorized initiators.

C.

Unauthorized initiators are blackholed by default.

D.

Zero Trust allows all initiators to see the destination, regardless of role and responsibility.

Questions # 5:

What is the security risk inherent in creating a split tunnel VPN, where some traffic is routed over the VPN tunnel and the rest over a direct internet connection?

Options:

A.

The VPN traffic is exempted from any security policies configured on the direct internet uplink router or appliance.

B.

You no longer have the visibility required to make decisions on those traffic flows that are going directly out to the internet.

C.

A split ACL list, which means only half the rules will be enforced.

D.

An issue between the built-in client VPN agent on most modern operating systems and a third-party VPN gateway upstream.

Questions # 6:

What protects Personally Identifiable Information (PII) accidentally shared by a colleague to the entire company?

Options:

A.

SSL/TLS inspection.

B.

Verifying identity and context through a secure identity provider.

C.

Data Loss Prevention (out-of-band and inline).

D.

Virtual firewalls.

Questions # 7:

Content stored within a SaaS/PaaS/IaaS location can be:

Options:

A.

100% trusted, as cloud providers make sure content is safe before it is uploaded.

B.

Considered risky until inspected, either through inline SSL/TLS controls or through assessing the files “at rest” using an out-of-band assessment.

C.

Partially trusted depending on whether you maintain a proper audit log for access.

D.

Should never be trusted.

Questions # 8:

Assessing, calculating, and delivering a risk score is: (Select 2)

Options:

A.

An assessment of inline and out-of-band network traffic.

B.

A review of known configuration, and the absence of other configuration details, of cloud-hosted services in relation to best practices, industry standards, and compliance models to ensure misconfigurations, issues, and vulnerabilities are understood and highlighted.

C.

An assessment of the content, not just the connection, of services, so that malicious functions are not downloaded and protected information is not lost.

D.

Only focused on initiator context.

Questions # 9:

What is the cause of performance issues for some VPN connections?

Options:

A.

A split tunnel VPN where you break out traffic destined for certain IP addresses to go direct.

B.

VPN vendors throttle network traffic on the overlay by default to reduce overhead on the VPN headend.

C.

Hairpinning cloud application traffic through a data center bottleneck.

D.

Interoperability issues between IPSec standards like IKEv1 and IKEv2.

Questions # 10:

What are the three main sections that the elements of Zero Trust are grouped into?

Options:

A.

Verify Identity and Context, Control Content and Access, and Enforce Policy.

B.

VPNs, firewalls, and legacy architectures.

C.

Castle-and-moat security architectures, with the data center and inbound DMZ being key.

D.

Routers, switches, and wireless access points.

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.