When configuring a ZDX custom application and choosing Type: 'Network' and completing the configuration by defining the necessary probe(s), which performance metrics will an administrator NOT get for users after enabling the application?
What does Zscaler Advanced Firewall support that Zscaler Standard Firewall does not?
What happens after the Zscaler Client Connector receives a valid SAML response from the Identity Provider (IdP)?
When a SAML IDP returns an assertion containing device attributes, which Zscaler component consumes the attributes first, for policy creation?
Does the Access Control suite include features that prevent lateral movement?
How does a Zscaler administrator troubleshoot a certificate pinned application?
An administrator needs to SSL inspect all traffic but one specific URL category. The administrator decides to create two policies, one to inspect all traffic and another one to bypass the specific category. What is the logical sequence in which they have to appear in the list?
An administrator wants to allow users to access a wide variety of untrusted URLs. Which of the following would allow users to access these URLs in a safe manner?
What is the recommended minimum number of App connectors needed to ensure resiliency?
Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?
Which of the following is unrelated to the properties of 'Trusted Networks'?
An organization has more than one ZIA instance, each on different clouds. The organization is using the same login domain for both and upon login users are given this menu in ZCC asking which cloud they would like to join. What steps could an Administrator take to avoid having this menu appear?