How is policy enforcement in Zero Trust done?
As a binary decision of allow or block.
Without trust, for example Zero Trust.
Conditionally, in that an allow or a block will have additional controls assigned, for example Allow and isolate, or Block and Deceive.
At the network level, by source IP.
In Zero Trust architecture, policy enforcement is conditional and context-based , not limited to a simple binary allow-or-block model. Zscaler’s reference architectures explain that policy is evaluated using the full user context, including identity, device posture, location, group membership, and other conditions. Access decisions are therefore based on whether specific policy conditions are true, rather than only on static network attributes such as source IP address. For example, the same authenticated user may be allowed access from a managed device at headquarters but denied from an airport, even with the same credentials.
Zscaler documentation also shows that Zero Trust policy can go beyond simple pass or deny outcomes by applying additional controls . In DNS Security and Control, requests can be allowed, blocked, or modified. In ZIA policy development, Cloud App controls allow more granular outcomes than standard allow/block, such as restricting specific actions, applying quotas, or controlling what a user can do inside an application. This reflects the Zero Trust principle that enforcement is adaptive, granular, and tied to business and security context rather than network location alone.
What is the security risk inherent in creating a split tunnel VPN, where some traffic is routed over the VPN tunnel and the rest over a direct internet connection?
The VPN traffic is exempted from any security policies configured on the direct internet uplink router or appliance.
You no longer have the visibility required to make decisions on those traffic flows that are going directly out to the internet.
A split ACL list, which means only half the rules will be enforced.
An issue between the built-in client VPN agent on most modern operating systems and a third-party VPN gateway upstream.
The correct answer is B . The core security risk of a split tunnel VPN is loss of visibility and consistent inspection for the traffic that bypasses the tunnel and goes directly to the internet. Zscaler’s Secure Mobile Access reference architecture explains that traditional VPNs backhaul traffic to a central data center for security through a legacy appliance stack, while modern remote work leads to a lack of visibility into what users are accessing and how the network is performing when the organization no longer controls the path.
ZIA guidance similarly states that user traffic must be forwarded to the nearest ZIA Service Edge so it can be inspected and either forwarded or blocked according to policy, and that the same authentication and policy should follow the user wherever they are. If some traffic exits directly to the internet outside that enforcement path, the organization loses the visibility and control needed to make reliable policy decisions on those flows. That is the real Zero Trust concern with split tunneling. It creates blind spots rather than a uniformly enforced security model. Therefore, the best answer is loss of visibility into traffic going directly to the internet .
Where is it most effective to assess the content of a connection?
At the policy enforcement point, as close to an initiator as possible, for example the closest edge.
Within a data center deployed in a one-armed concentrator mode.
On disk, after first being copied several times for a backup.
Within an ISP’s fiber backbone.
The correct answer is A . In Zero Trust architecture, content inspection is most effective when it happens inline at the policy enforcement point and as close to the initiator as possible . This improves both security and user experience. From a security standpoint, inspecting traffic early allows the platform to identify malware, risky content, command-and-control behavior, and sensitive data movement before the traffic continues deeper into the environment or reaches the destination. From a performance standpoint, enforcing policy at the nearest edge reduces unnecessary backhaul and helps maintain a more efficient path.
This aligns with modern cloud-delivered Zero Trust design, where users connect to the nearest enforcement point rather than being forced through a central data center stack. A one-armed concentrator model is a legacy deployment concept and is less effective for distributed users and applications. Inspecting data only after it has been copied to disk is too late for inline protection, and an ISP backbone is not the enterprise’s policy enforcement location. Therefore, the best answer is that content should be assessed at the enforcement point closest to the initiator , such as the nearest service edge.
What is the trend that is increasing security risk through legacy solutions that drive network sprawl?
A spread-out group of access control lists (ACLs) and firewall rules, with each firewall and VPN appliance only enforcing a subset of the total rule list.
A desire to replace edge routers with SD-WAN boxes, which can leverage multiple uplinks for active-active VPN failover.
An ongoing dependence on Layer 2 and Layer 3 switching, without consideration for upcoming 5G architectures.
More applications moving to the cloud, users being remote, and VPNs and firewalls extending IP connectivity out to several different locations.
The correct answer is D . Zscaler’s Zero Trust architecture specifically contrasts modern distributed environments with legacy VPN- and firewall-based designs. The reference architecture explains that users are now remote, applications can be hosted in public cloud, private cloud, or data centers, and access must work across any location. In legacy models, organizations respond by extending IP connectivity outward through VPNs, firewalls, and other network-based controls. That expansion increases the attack surface, preserves broad network trust, and drives network sprawl instead of reducing it.
The same guidance states that Zero Trust gives users access to applications without ever placing them on the network or exposing apps to the internet . This is important because legacy architectures extended the organizational perimeter to end users, allowing lateral movement and increasing risk when users and apps became more distributed. Option A describes a symptom of legacy complexity, but option D captures the broader trend that is causing the sprawl in the first place: cloud migration, remote users, and the continued use of VPN and firewall architectures to maintain connectivity. That is the most accurate Zero Trust answer.
Content stored within a SaaS/PaaS/IaaS location can be:
100% trusted, as cloud providers make sure content is safe before it is uploaded.
Considered risky until inspected, either through inline SSL/TLS controls or through assessing the files “at rest” using an out-of-band assessment.
Partially trusted depending on whether you maintain a proper audit log for access.
Should never be trusted.
The correct answer is B . In Zero Trust architecture, content stored in Software as a Service (SaaS), Platform as a Service (PaaS), or Infrastructure as a Service (IaaS) environments should not be assumed safe simply because it resides in a cloud platform. Zscaler’s security model emphasizes that trust must be established through inspection and policy , not by location alone. The TLS/SSL inspection architecture shows that inline inspection is necessary to evaluate content moving through encrypted sessions, while Zscaler’s broader data protection model also includes out-of-band assessment for content already stored in cloud services.
This aligns with the Zero Trust principle that applications and content can exist anywhere, but they are not automatically trustworthy because of where they are hosted. Cloud providers secure the platform, but they do not guarantee that every uploaded file, shared object, or stored dataset is safe, compliant, or free from malware or data exposure risk. At the same time, saying content should never be trusted is too absolute; Zero Trust is about verification , not blanket denial. Therefore, the most accurate answer is that cloud-stored content should be treated as risky until inspected , whether inline during transfer or out of band while at rest.
Is risk the same across users?
Yes.
No.
The correct answer is B. No. In Zero Trust architecture, risk is not uniform across users . Zscaler guidance explains that policy and access decisions are based on the entire user context , including identity, device, location, compliance state, and other factors. The same user can even receive different access outcomes depending on whether they are on a corporate laptop at a branch office or on a personal phone at a coffee shop.
This means risk is dynamic and personalized. One user may be low risk because they are on a managed, compliant endpoint in a trusted environment. Another user may be higher risk because they are using an unmanaged device, showing risky behavior, or requesting access to a more sensitive application. Zero Trust depends on this variation. If risk were identical across all users, there would be no need for granular policies, posture checks, or context-aware enforcement.
Therefore, Zero Trust assumes that risk changes by user, device, session, location, and requested application. That is why access policy is evaluated per request rather than applied as a one-size-fits-all model. The correct answer is No .
Connections approved by the Zero Trust Exchange must then enable permanent network-level access for at least 30 days.
True
False
The correct answer is B. False . Zero Trust architecture is specifically designed to avoid giving users broad, lasting network-level access after a connection is approved. Zscaler’s Universal ZTNA guidance states that users connect directly to applications, not the network , which minimizes attack surface and eliminates lateral movement. This means approval is tied to the specific access request and the relevant context at that moment, not to an ongoing entitlement to the underlying network.
The idea of granting network-level access for 30 days is much closer to a legacy VPN model, where a user is placed onto a routable network and may retain broad reachability beyond the immediate business need. Zero Trust does the opposite. It verifies identity and context, evaluates policy, and then enforces a specific control outcome for that request. If the user’s context changes, the policy outcome can also change. That is why Zero Trust is often described as dynamic and per-access , rather than static and persistent. A connection approved by the Zero Trust Exchange does not imply a long-term network privilege; it enables only the necessary application access under current policy conditions.
Which of the following actions can be included in a conditional “block” policy? (Select 2)
Quarantine: Ensure access is stopped and assessed.
Deceive: Direct any malicious attack to a restricted decoy.
Firehose: Send TCP resets to the initiator.
Allow the connection.
The correct answers are A and B . In Zero Trust architecture, policy enforcement is not limited to a plain deny decision. Instead, policy can apply contextual control actions based on the assessed risk of the user, device, session, or application behavior. A conditional block policy is meant to stop or contain malicious or unauthorized activity while also reducing attacker effectiveness.
Quarantine fits this model because it stops access and places the session, user, or device into a controlled state for further review or remediation. That aligns with Zero Trust principles of least privilege, continuous assessment, and adaptive response. Deceive also fits because modern Zero Trust protections can misdirect suspicious or malicious activity toward controlled decoy resources, limiting real exposure while improving detection and response. This is consistent with Zscaler architecture language describing inline prevention, deception, and threat isolation as protective controls.
By contrast, Allow the connection is not a block action, and Firehose is not a standard Zero Trust conditional block control in the architecture concepts you are testing against. Therefore, the two correct answers are Quarantine and Deceive.
Data center applications are moving to:
The branch.
Castle and moat type architectures.
The DMZ.
The cloud.
The correct answer is D. The cloud . Zero Trust architecture assumes that applications are no longer confined to traditional on-premises data centers. Zscaler’s Universal Zero Trust Network Access (ZTNA) guidance reflects that private applications increasingly exist across public cloud, private cloud, and data center environments , and users must securely access them without being placed on the network. This shift is one of the main reasons legacy castle-and-moat models are no longer sufficient.
In older architectures, applications were commonly protected by network location, perimeter firewalls, and DMZ-based publishing patterns. But as applications move to cloud environments, those location-based controls become harder to manage and less effective. Zero Trust instead applies identity, device posture, context, and application-specific policy, regardless of where the workload is hosted. Zscaler specifically positions ZPA and Universal ZTNA to support access to applications in public cloud instances , private cloud environments, and internal data centers through the same policy-driven model.
Because the long-term trend is away from fixed perimeters and toward distributed application hosting, the most accurate answer is that data center applications are moving to the cloud .
What are two categories of destination applications in Zero Trust?
(a) Known: the application has been categorized, classified, and updated dynamically; (b) Unknown: the application does not meet an existing category and must be profiled, learned, and controlled conditionally.
(a) Google, (b) non-Google.
(a) SaaS, (b) PaaS.
(a) all things on the internet, (b) all things internal.
The correct answer is A . In Zero Trust architecture, destination applications must be understood and differentiated so the right policy can be applied. Zscaler’s ZPA segmentation guidance explains that organizations need to identify, define, and characterize applications as part of moving from network-based access to granular user-to-application segmentation. This naturally supports a distinction between known applications , which are already categorized and understood, and unknown applications , which still require profiling, learning, and more cautious control.
This approach is consistent with Zero Trust because applications are not all treated equally. If an application is well understood, policy can be more precise. If it is unknown or not yet properly categorized, the enterprise may need to inspect, limit, isolate, or otherwise conditionally control access until its risk and purpose are clear. The other options are too narrow or too generic to represent the intended Zero Trust categorization model. Therefore, the best answer is the distinction between known and unknown destination applications, with unknown applications requiring profiling and conditional control before they can be fully trusted.
The Zscaler Client Connector is:
A device used to create a secure communication channel with a Web Application Firewall (WAF).
A cloud-managed endpoint device via an MDM solution.
An agent installed on the endpoint to tunnel authorized user traffic to the Zero Trust Exchange for protection of SaaS, private applications, and internet-bound traffic.
A marketplace platform that connects different types of business clients to each other.
The correct answer is C . Zscaler documentation describes Zscaler Client Connector as a lightweight software agent that runs on the endpoint and connects user devices to Zscaler cloud-hosted services. It enables protection for internet destinations through ZIA , access to private applications through ZPA , and visibility through ZDX . The secure mobile access reference architecture states that Zscaler Client Connector connects users and devices to the Zscaler Zero Trust Exchange and enables secure access to the internet and private applications from any location.
This directly matches the description in option C. The agent tunnels or redirects the user’s authorized traffic to the Zero Trust Exchange, where security policy and access controls are enforced. It is not a WAF device, not an endpoint itself, and not a marketplace platform. The ZPA troubleshooting guide also notes that the initial request to a private application is initiated from Zscaler Client Connector, which intercepts the application request and forwards it appropriately for policy evaluation and brokering.
Therefore, the correct definition is that Zscaler Client Connector is an endpoint agent that securely tunnels authorized user traffic to the Zero Trust Exchange .
What are the three main sections that the elements of Zero Trust are grouped into?
Verify Identity and Context, Control Content and Access, and Enforce Policy.
VPNs, firewalls, and legacy architectures.
Castle-and-moat security architectures, with the data center and inbound DMZ being key.
Routers, switches, and wireless access points.
The correct answer is A . In the Zero Trust architecture model used throughout this question set, the elements of Zero Trust are grouped into three major sections: Verify Identity and Context , Control Content and Access , and Enforce Policy . This structure reflects the way Zero Trust moves away from implicit trust based on network location and instead applies security based on identity, context, content awareness, and policy-driven control.
First, the architecture verifies who is making the request and under what conditions , such as device posture, location, group membership, or risk context. Next, it controls what is being accessed and what content is involved , which is where inspection, application awareness, and content-based protections become essential. Finally, it enforces policy by applying the exact outcome required for that request, such as allow, restrict, isolate, deceive, or block.
The other answer choices describe legacy infrastructure components or traditional perimeter approaches, not the three conceptual sections of Zero Trust. Therefore, the only correct grouping is Verify Identity and Context, Control Content and Access, and Enforce Policy .
Zero Trust access can work over any type of network.
True
False
The correct answer is A. True. Zero Trust architecture is designed so that access decisions are independent of the underlying network as a trust boundary. Zscaler’s ZPA guidance states that Zero Trust Network Access (ZTNA) gives users secure connectivity to private applications without ever placing them on the network, and that users can access applications without sharing network context with them.
Zscaler Client Connector guidance also states that it connects user devices to Zscaler cloud-hosted services independent of the user’s location, and the ZIA traffic-forwarding architecture explains that the same authentication and policy follow the user wherever they are. This means the access model can work across corporate networks, home broadband, public Wi-Fi, mobile networks, branch environments, and other transport types, because trust is derived from identity, posture, context, and policy, not from being on a particular network.
The network still carries the traffic, but it does not determine trust. That is one of the defining characteristics of Zero Trust. Therefore, the statement is true: Zero Trust access can work over any type of network.
Policy enforcement in Zero Trust is assessed:
For all traffic from the initiating source.
Only if the risk score is high.
For authorized users only.
For every access request.
The correct answer is D. For every access request. Zero Trust architecture does not assume that a user, device, or session remains trusted after an initial decision. Instead, access is evaluated request by request , using current identity and contextual information. Zscaler’s ZPA guidance explains that when a user authenticates, context such as location, device posture, user group, department, and time of day is evaluated, and when the user attempts to access a resource, that context is matched against policy to determine whether access should be allowed.
ZIA guidance reinforces the same principle by stating that policy assignment evaluates the user, device, location, group, and more to determine which policies apply. That means policy enforcement is not limited to high-risk sessions, nor is it applied only once to all future traffic from a source. It is also not restricted only to already authorized users, because the authorization decision itself is part of the evaluation. In Zero Trust, each access request is independently assessed and enforced according to current policy and context. That is why the best answer is for every access request .
What does deception as a conditional block policy allow an enterprise to do?
Engage in double-extortion negotiations.
Conditionally decide which access request is sent to a decoy service, not the real destination workload, thus allowing security teams insight into questionable activity.
Create various policy tiers, including several quarantine VLANs.
Rethink its security posture, leveraging local breakouts from branch sites so that user traffic is filtered through a secure web gateway.
The correct answer is B . In Zero Trust architecture, deception as a conditional block policy means suspicious or malicious activity is not sent to the real destination. Instead, the request is redirected to a decoy or controlled service , allowing defenders to observe and understand the behavior without exposing the actual workload. This provides both protection and intelligence. It blocks harmful access while generating insight into attacker methods, compromised accounts, or risky automation.
This aligns with the Zero Trust idea that policy outcomes can be more sophisticated than simple allow or deny. A conditional block with deception is especially valuable when an enterprise wants to stop the request but also gain visibility into why the request is suspicious and how the initiator behaves when interacting with what it believes is the real target.
The other options do not match the concept. Extortion negotiations are unrelated, quarantine VLANs are a legacy network-centric control, and branch local breakout is a traffic-forwarding design choice. Therefore, deception allows the enterprise to selectively redirect questionable access attempts to a decoy service and gather useful security insight while keeping the real destination protected.
How are services protected in a legacy scenario when they are discoverable on the public Internet? (Select all that apply)
Establishing a DMZ that would include multiple products and services.
Dynamic Application Security Testing (DAST).
A large security stack including appliances that handle functions like global load balancing, firewalling, DDoS, and more.
A web application firewall (WAF) for protecting against DDoS and other botnet style attacks.
The correct answers are A, C, and D . In a legacy architecture, applications that are exposed and discoverable on the public Internet are usually protected by building a DMZ (demilitarized zone) and placing multiple security technologies in front of the service. This commonly includes a large security stack made up of separate appliances or services for functions such as load balancing, firewalling, distributed denial-of-service (DDoS) protection, and related edge security controls. A web application firewall (WAF) is also a standard protective element in these public-facing designs because it adds inspection and protection for web-based attack patterns and internet-originated abuse.
Option B, DAST , is not a correct answer because Dynamic Application Security Testing is a testing and assessment method, not a live architectural protection control that sits inline to defend exposed services in production. Zero Trust architecture contrasts with this legacy model by removing direct public discoverability and reducing dependence on a complex exposed edge stack. Instead of defending openly exposed applications with layered perimeter tools, Zero Trust aims to make applications less discoverable and access more identity- and policy-driven.
Should a Zero Trust solution inspect traffic for all destinations?
No. Only traffic destined to engineering services and financial applications.
No. Traffic should never be inspected.
No. It is important to find a balance. The Zero Trust solution should give the enterprise the ability to implement inspection for any application or destination. Although it is strongly recommended, it is up to the enterprise to decide where inspection is needed.
No. Only non-TLS/SSL-based traffic should be inspected.
The correct answer is C . In Zscaler’s Zero Trust architecture, the recommended goal is to inspect as much traffic as possible , especially encrypted traffic, because inspection enables key protections such as malware detection, sandboxing, intrusion prevention system (IPS), browser isolation, Data Loss Prevention (DLP), cloud app controls, tenancy restrictions, and file type controls. The TLS/SSL inspection reference architecture explicitly states that organizations should strive for 100% of traffic to be inspected and that Zscaler strongly recommends this as the starting point.
At the same time, the same guidance also confirms that exceptions can exist. It says bypasses may be required for regulatory, vendor, or contractual reasons, and that bypasses should be used only in extreme circumstances . Examples include certificate-pinned applications, some Microsoft 365 flows, and certain regulated destinations. That means the platform should be able to inspect any application or destination , but the enterprise decides where inspection is ultimately enforced. Therefore, the best answer is not “always inspect with no exceptions,” but rather that full inspection is strongly recommended while allowing enterprise-controlled exceptions when justified.
Historically, initiators and destinations have shared which of the following?
A network, because prior to Zero Trust there was no other way to connect the two.
The same IP subnet range.
The same punch card machine, pre-computer.
Physical hard drives and storage.
The correct answer is A . Historically, before modern Zero Trust models were adopted, the normal way to connect a user to an application or service was to place both within a shared network context . This did not always require the exact same subnet, but it did require some level of common routable network connectivity. Legacy architectures assumed that once the user was on the trusted network, or extended into it through technologies such as VPN, they could reach the destination across that network.
Zero Trust architecture changes this assumption. Zscaler’s architectural guidance emphasizes that users should gain access to applications without sharing network context or routing domain with those applications. That is one of the most important distinctions between legacy network-centric security and Zero Trust. The user no longer needs broad network reachability just to get to a specific service. Option B is too narrow because shared access historically did not always mean the same subnet. Options C and D are clearly incorrect. Therefore, the best answer is that initiators and destinations historically shared a network , because legacy connectivity depended on routed network access rather than identity-based, per-application brokerage.
Why should an enterprise categorize applications as part of its secure digital transformation to a Zero Trust architecture?
To build structured naming conventions for applications, for example Country:City:Location:Function.
So that these can be stored in a CMDB (Configuration Management Database) system, which can be used as a policy enforcement plane for application traffic.
To differentiate destination applications from each other, thus enabling the deployment of granular control from valid initiator to valid destination application.
To know which ACLs to set on their firewall.
The correct answer is C. In Zero Trust architecture, applications must be identified, defined, and differentiated so that policy can be applied at a granular level. Zscaler’s Zero Trust User-to-App Segmentation guidance explains that organizations should identify, define, and characterize applications and application segments as part of the move from legacy network-based access to a user-based approach using application segments and access policies. That directly supports the idea that application categorization is necessary to distinguish one destination from another and apply the correct user-to-application policy.
This is important because Zero Trust does not grant broad network access and then rely on downstream controls. Instead, it gives access to the right application for the right initiator under the right conditions. Without meaningful application categorization, organizations cannot create granular segmentation or precise access policies. Naming conventions and CMDB storage may be useful operationally, but they are not the core reason. Likewise, ACL planning belongs to legacy firewall thinking rather than Zero Trust design. Therefore, the strongest architecture-aligned answer is that applications are categorized in order to differentiate destinations and enable granular control from valid initiator to valid destination application.
TESTED 29 Apr 2026

