Study set Exam Questions With 100%
Complete Solutions Rated A+
What is used to detect if a SAML assertion was modified after being issued?
Options:
- XML
- Digital Signatures
- Attributes
- Tokens - CORRECT ANSWER-Digital Signatures
How is a SAML assertion delivered to Zscaler?
Options:
- The IdP sends it via an HTTP post directly to the SP via a backend API
- The SP sends it via an HTTP post directly to the IdP via a backend API
- The IdP sends it via the user's browser to the SP
- The SP sends it via a trusted authority to the IdP - CORRECT ANSWER-The IdP
sends it via the user's browser to the SP
(Uses a form POST submitted via JavaScript)
In what way does Zscaler's Identity Proxy enable authentication to SaaS applications?
Options:
,- Injecting identity headers into the HTTP request
- SSL Inspection
- Browser Isolation
- Issuing SAML assertions - CORRECT ANSWER-Issuing SAML assertions
How does Zscaler Internet Access authenticate users? (Select 3)
Options:
- SAML
- SCIM
- LDAP
- Hosted Database - CORRECT ANSWER-SAML, LDAP, Hosted Database
How does Zscaler Private Access authenticate end users?
Options:
- Username and Password in a form-based auth
- Hosted DB
- SAML
- SCIM - CORRECT ANSWER-SAML
What is the fastest way to change a user's access entitlements? - CORRECT
ANSWER-Send different attributes via SCIM
In order for Zscaler to enforce policy based on accessing devices, what method is best
used by IdPs to share information about a user's accessing device?
, Options
- Kerberos
- SAML
- Header Injection
- Mobile Device Management - CORRECT ANSWER-SAML
Privileged Remote Access supports which protocols? (Select 2)
Options:
- SSH
- RDP
- CIFS
- HTTP/HTTPS - CORRECT ANSWER-SSH, RDP
Which services can coexist on an Application Segment?
Options:
- Isolation, Browser Access, and Inspection
- RDP, SSH, and Inspection
- Inspection, Isolation, and RDP
- CIFS, RDP, and SSJ - CORRECT ANSWER-Isolation, Browser Access, and
Inspection
How often does the Zscaler Client Connector check for software updates?