Cybersecurity Services Exam 1
Which user group typically requires special Cloud Sandbox policies for
EXE files?
a) Marketing team
b) Sales team
c) IT help desk
d) Finance department - Correct Answer ✔️✔️c) IT help desk
What is the primary purpose of the Cloud Effect in Sandbox workflow?
a) To check file hash against blacklists
b) To perform dynamic analysis
c) To create new signatures
,d) To encrypt files - Correct Answer ✔️✔️a) To check file hash
against blacklists
How does Browser Isolation help prevent credential theft?
a) By encrypting all passwords
b) By blocking all login forms
c) By making suspicious sites read-only
d) By requiring two-factor authentication - Correct Answer ✔️✔
️c) By making suspicious sites read-only
What type of files does Zscaler recommend quarantining from
suspicious destinations?
a) PDF files
b) EXE files
c) Text files
d) Image files - Correct Answer ✔️✔️b) EXE files
, Which capability is NOT mentioned as part of Zscaler's layered defense
approach?
a) URL filtering
b) Cloud Sandbox
c) Biometric authentication
d) Browser Isolation - Correct Answer ✔️✔️c) Biometric
authentication
What technology does Zscaler use to identify applications running on
non-standard ports?
a) Port scanning
b) Deep packet inspection
c) Network mapping
d) Protocol analysis - Correct Answer ✔️✔️b) Deep packet
inspection