,
,
, In what way does Zscaler's Identity Proxy enable authentication to SaaS applications?
Options:
- Injecting identity headers into the HTTP request
- SSL Inspection
- Browser Isolation
- Issuing SAML assertions
Issuing SAML assertions
How does Zscaler Internet Access authenticate users? (Select 3)
Options:
- SAML
- SCIM
- LDAP
- Hosted Database
SAML, LDAP, Hosted Database
How does Zscaler Private Access authenticate end users?
Options:
- Username and Password in a form-based auth
- Hosted DB
- SAML
- SCIM
2 ZSCALER EDU 200 - ESSENTIALS - ZDTA STUDY GUIDE SET EXAM@!#
,
, In what way does Zscaler's Identity Proxy enable authentication to SaaS applications?
Options:
- Injecting identity headers into the HTTP request
- SSL Inspection
- Browser Isolation
- Issuing SAML assertions
Issuing SAML assertions
How does Zscaler Internet Access authenticate users? (Select 3)
Options:
- SAML
- SCIM
- LDAP
- Hosted Database
SAML, LDAP, Hosted Database
How does Zscaler Private Access authenticate end users?
Options:
- Username and Password in a form-based auth
- Hosted DB
- SAML
- SCIM
2 ZSCALER EDU 200 - ESSENTIALS - ZDTA STUDY GUIDE SET EXAM@!#