What is the recommended minimum number of App connectors needed to ensure resiliency?
Correct : A
The recommended minimum number of App connectors to ensure resiliency in Zscaler Private Access is 2. Having at least two App connectors provides redundancy, so if one connector fails or is unavailable, the other can continue to provide access without interruption. This recommendation is critical to maintaining high availability and fault tolerance for internal application access.
The study guide specifies this minimum to ensure continuity and reliability of application access through ZPA.
Start a Discussions
What mechanism identifies the ZIA Service Edge node that the Zscaler Client Connector should connect to?
Correct : B
Start a Discussions
Within ZPA, the mapping relationship between Connector Groups and Server Groups can best be defined as which of the following?
Correct : D
Server Groups in ZPA use Dynamic Server Discovery to supply Connector Groups with the application endpoints' DNS names or IPs. The Connector Groups then resolve those addresses and perform health checks to ensure the applications are reachable before steering user traffic.
Start a Discussions
What are the two types of Probe supported in ZDX?
Correct : A
ZDX supports two probe types: Web Probes and Cloud Path Probes. Web Probes actively retrieve web objects to measure application health, while Cloud Path Probes map the end to end network path to pinpoint transit issues.
Start a Discussions
A user is accessing a private application through Zscaler with SSL Inspection enabled. Which certificate will the user see on the browser session?
Correct : D
When SSL Inspection is enabled and a user accesses a private application through Zscaler, the user will see a Zscaler generated MITM (Man-In-The-Middle) Certificate on their browser session. Zscaler intercepts and decrypts SSL/TLS traffic at the Service Edge and then re-encrypts it before forwarding it to the client, presenting its own certificate to maintain the security of the connection while enabling inspection.
This allows Zscaler to inspect encrypted traffic for threats and policy enforcement transparently without exposing the original server's certificate. The study guide clarifies this mechanism under SSL Inspection details.
Start a Discussions