What happens in the post processing stage? - Correct Answer ✔️✔
️Threat DB is updated to deliver immediate cloud effect and policy
enforcement rules.
AI-Driven Quarantine Effect of Cloud Sandbox: - Correct Answer ✔️
✔️An AI-driven malware prevention engine intelligently identifies,
quarantines, and prevents unknown or suspicious threats inline using
advanced AI/ML without rescanning benign files.
What is Command and Control technique? - Correct Answer ✔️✔
️A technique used by attackers to communicate with compromised
devices over a network.
What does Votiro mean? - Correct Answer ✔️✔️A Content
Disarm and Reconstruction (CDR) services which ensures the
sanitization of files
,What does Zscaler Cloud Sandbox do? - Correct Answer ✔️✔
️Automatically detects, prevents, and intelligently quarantines
unknown threats and suspicious files
Which of the following techniques is capable of detecting bad packets
and taking an action? - Correct Answer ✔️✔️Advanced Threat
Protection (ATP)
Seek out potential threats with powerful detection capabilities,
delivered globally from the Zero Trust Exchange platform - Correct
Answer ✔️✔️IPS
What does the Miragemaker module do? - Correct Answer ✔️✔
️The Miragemaker module in Zscaler Deception allows you to
configure and manage various ready-to-use resources that are typically
used to build and deploy different types of decoys.
,Which of the following Zscaler's capabilities allows users to gain instant
access to the content of potential zero day productivity files? - Correct
Answer ✔️✔️Browser Isolation Safe Document Rendering
Within Zscaler Zero Trust Exchange architecture, which of the following
services is comparable with a Web Application Firewall (WAF)? -
Correct Answer ✔️✔️Private App Protection
Which of the following technologies allows you to define criteria for
selecting specific web traffic and apply an isolation profile to ensure
secure browsing? - Correct Answer ✔️✔️Contextual aware
Protection
Customers can bring their own custom signatures to create custom IPS
rules as a part of Zscaler's cloud firewall functionality. - Correct
Answer ✔️✔️TRUE
Why is it important to use IPS to look at traffic on non-standard ports? -
Correct Answer ✔️✔️It is common for attackers to sometimes
, use non-standard ports for well known applications - e.g. running a web
server on port 8999
How does Zscaler protect against unknown malicious files? - Correct
Answer ✔️✔️With Cloud Sandbox, ZIA can detonate unknown files
in an isolated environment and then use dynamic analyses to mark the
file as malicious
What technology can help in protecting users from websites running
never seen before malicious javascript? - Correct Answer ✔️✔
️Browser Isolation can be used to safely render websites through a
pixelated stream eliminating any malicious javascript from executing
What is the "Cloud Effect" as it pertains to Cloud Sandbox? - Correct
Answer ✔️✔️The MD5 hash of a file deemed malicious from
Sandbox or threat feeds is uploaded to the cloud so that at any time
any customer sees the same file, it will be blocked