Which service provides continuous monitoring of user behavior in ZTNA?
AUser Risk Assessment
BSession Reauthorization
CAccess Control List
DVPN Tunneling
Explanation
User Risk Assessment continuously evaluates user behavior, while the others do not focus on behavior analytics.
Q152
A company needs to enforce multi-factor authentication (MFA) for remote access. Which ZTNA feature should they implement?
AZero Trust Policy
BIdentity Federation
CCloud Access Security Broker
DSingle Sign-On
Explanation
Zero Trust Policy allows for MFA enforcement, while the others are different aspects of identity management or access control.
Q153
What happens when a user's risk level exceeds a predefined threshold in ZTNA?
ASession is terminated
BUser is notified via email
CAccess is granted with restrictions
DUser gains elevated privileges
Explanation
When a user's risk level exceeds the threshold, the session is terminated to maintain security, while the other options would undermine security protocols.
Q154
Which service allows granular access control in ZTNA?
AIdentity and Access Management
BNetwork Load Balancer
CData Loss Prevention
DEndpoint Protection
Explanation
Identity and Access Management provides fine control over user access based on identity; the others do not focus on access controls directly.
Q155
A company needs to enforce policy-based access. What should they implement?
ANetwork Segmentation
BStateless Firewalls
CZero Trust Network Access
DVirtual Private Network
Explanation
Zero Trust Network Access enforces policy-based access by default, while the others primarily focus on secure connectivity.
Q156
You are configuring a ZTNA solution. What happens when a device is compliant with policies?
AFull access to all resources
BLimited access based on roles
CAutomatic enrollment in user programs
DAccess is denied from the network
Explanation
Limited access based on roles is typical; full access is not the ZTNA model.
Q157
Which service is a core component of Symantec ZTNA?
ASecure Access Service Edge (SASE)
BFirewall Management System
CData Loss Prevention (DLP)
DEndpoint Detection and Response (EDR)
Explanation
SASE integrates ZTNA functionalities for secure access, while others are not core to ZTNA.
Q158
A company needs to restrict access based on user identity and device posture. What should they implement?
AZero Trust Network Access
BVPN with IP whitelisting
CStatic Access Control Lists
DTraditional Firewall Rules
Explanation
Zero Trust Network Access evaluates both identity and posture, while others lack this capability.
Q159
You are configuring user access policies in Symantec ZTNA based on locations. What is crucial?
AUser's device OS version
BThreat intelligence updates
CUser's physical location
DVPN connection speed
Explanation
User's physical location is essential for access policies, while the other options are irrelevant.
Q160
Which service allows secure access to internal applications without exposing them to the internet?
AVMware SD-WAN
BVMware ZTNA
CVMware ESXi
DVMware vSphere
Explanation
VMware ZTNA provides secure, controlled access to internal applications, unlike other options which serve different purposes.