What happens when a user's access level changes in a ZTNA deployment?
AImmediate access revoke
BAutomatic access adjustment
CAccess remains unchanged
DSystem crash occurs
Explanation
Automatic access adjustment ensures continuous compliance with security policies, while others do not reflect standard behavior.
Q136
Which service is used to dynamically manage access policies in Symantec ZTNA?
ASymantec Traffic Management
BSymantec Policy Engine
CSymantec Identity Control
DSymantec Network Link
Explanation
The Symantec Policy Engine dynamically manages access policies, while the others represent different functionalities.
Q137
A company needs to implement zero-trust principles for its remote workforce. What should be the first step?
ADeploy a universal VPN solution
BEstablish user identity verification
CEnable endpoint encryption
DConduct a network audit
Explanation
Establishing user identity verification is a fundamental principle of zero trust security.
Q138
What happens when a user attempts to access an unauthorized application while using Symantec ZTNA?
AAccess is logged and denied
BUser is redirected to help desk
CAccess is granted temporarily
DUser receives a warning email
Explanation
Access is logged and denied to maintain security policy enforcement.
Q139
Which service primarily enables secure access control in ZTNA implementations?
AIdentity and Access Management
BData Loss Prevention
CNetwork Performance Monitoring
DEndpoint Security
Explanation
Identity and Access Management is crucial for ZTNA as it governs user authentication and authorization, while the other options serve different security functions.
Q140
A company needs to implement ZTNA for remote access. What is the first step they should take?
AConduct a risk assessment
BPurchase ZTNA hardware
CTrain employees on ZTNA
DConfigure VPN settings
Explanation
Conducting a risk assessment helps identify assets and vulnerabilities, leading to an informed ZTNA implementation plan, unlike the other options which are premature.