Question 1: Correct answer
What is Zscaler for Users?
A use case
A program
A platform
A solution
Question 2: Correct answer
Which Zscaler solution would you focus on if you heard the customer is
concerned with the exfiltration of intellectual property through the use of
personal sharepoint sites and other collaboration tools?
Business Analytics
Zscaler for IOT/OT
Data Protection
Deception
Question 3: Correct answer
Which of the following is a valid use case for Zscaler Data Protection?
Stopping cyber threats
Halting employee Data Loss
Providing Browser Access to private web applications
Providing visibility into the endpoint, network, and application
Question 4: Correct answer
Which Zscaler solution would you focus on if you heard that the customer is
concerned with the security of their VPN but still needs an effective way to
extend access to remote employees?
Data Protection
Zero Trust Connectivity
Business Analytics
Deception
Question 5: Correct answer
Which of the following is a valid use case for Zscaler Business Analytics?
The need to calculate a risk score for all of your assets
The need to stop cyber threats
UCaas Monitoring and support
The need to provide clientless access to private applications
Question 6: Correct answer
Which Zscaler solution would you focus on if you heard that the customer
has no way of monitoring the digital experience for remote employees?
(Select One)
Data Protection
Cyber Threat Protection
Deception
Business Analytics
Question 7: Correct answer
Business Analytics is made up of three solutions, Zscaler Digital Experience
and what else?
Business Insights
ZPA
ZIA
Risk360
Question 8: Correct answer
Which of the following is a valid use case for Zscaler Cyber Threat
Protection?
Protect against Supply Chain attacks
VPN replacement
Providing end-to-end visibility
Monitoring SaaS application performance
Question 9: Correct answer
Zscaler Data Protection prevents data loss in two scenairos, which ones are
they? (Select 2)
Data seen by the Firewall
Data seen by the Sandbox
Data in Motion
Data at Rest
Question 10: Correct answer
Which is a valid discovery question for Zscaler Deception?
How do you provide a User Portal for 3rd party contractors?
How do you secure connectivity in cloud between diverse workloads?
How do you secure your enterprise from ransomware attacks?
How do you provide access to your OT network?