1. What is IP Fragmentation and why is required?
2. What among these are HTTP Request Methods?
4. Pick the order of Traffic Flow for the secure communication between client and web server
- Server Hello
- TCP Handshake
- DNS Resolution
- Server Certificate Exchange
- Client Hello
5. Does TLS use symmetric or asymmetric encryption?
6. Which of the following Traffic Forwarding Method is recommended for all network types?
7. Which of the following is not a user authentication method for Zscaler?
8. Which of the below operating systems where ZCC is supported?
9. Which of the following policies is not part of the access control category under the ZIA Admin portal?
10. The Advanced Threat Protection policy can be applied per user.