You are configuring session management in ZTNA. What happens when a user exceeds their session limit?
AUser remains connected without any issue
BUser is logged out and needs to re-authenticate
CSession is indefinitely extended
DUser's access is completely revoked
Explanation
Exceeding the session limit typically results in the user being logged out to ensure compliance with security policies; other options misrepresent user session behavior.
Q172
Which service provides policy-based access control in ZTNA?
AAccess Control Service
BZero Trust Policy Engine
CSession Management Service
DNetwork Performance Monitoring
Explanation
The Zero Trust Policy Engine defines access policies, while the others serve different purposes.
Q173
A company needs to enforce continuous authentication. What should they implement?
AMulti-Factor Authentication
BStatic Access Credentials
CSession Cookies Only
DSingle Sign-On
Explanation
Multi-Factor Authentication provides the necessary continuous verification, unlike the others that don't maintain ongoing checks.
Q174
You are configuring identity governance in ZTNA. What must you ensure?
AUniform access across devices
BIntegrated directory services
COnly VPN-based access
DStatic IP address access
Explanation
Integrated directory services enable effective identity governance, while the others limitation access and monitoring.
Q175
Which service in VMware ZTNA is responsible for controlling user access?
AAccess Broker
BTraffic Shaper
CNetwork Analyzer
DSecurity Scanner
Explanation
Access Broker manages user authentication and authorization, while the others serve different functions.
Q176
A company needs to enforce zero trust policies; which approach should they adopt?
AMicro-segmentation
BStatic firewall rules
CNetwork Address Translation (NAT)
DSite-to-site VPN
Explanation
Micro-segmentation limits access per workloads, aligning with zero trust principles unlike the other options.
Q177
What happens when users are erroneously marked as non-compliant in ZTNA?
AThey are granted full access
BTheir access is immediately revoked
CThey receive a warning only
DThey are redirected to logs
Explanation
Non-compliance leads to an immediate access revoke to maintain security integrity, unlike other responses.
Q178
Which service is primarily used for identity management in Symantec ZTNA?
AIdentity Access Management
BNetwork Traffic Analyzer
CSecure Web Gateway
DThreat Intelligence Service
Explanation
Identity Access Management integrates with ZTNA to manage user identities; others focus on network security or threat analysis.
Q179
A company needs to restrict access to sensitive applications based on user location. What should they implement?
AData Loss Prevention
BContextual Access Policies
CService Mesh Compliance
DNetwork Traffic Segmentation
Explanation
Contextual Access Policies allow access restrictions based on user location; the other options pertain to different security concerns.
Q180
You are configuring ZTNA authentication. What happens when an authentication policy is set to 'Deny all' by default?
AAll users are granted access.
BOnly whitelisted users gain access.
CZero users have access until configured.
DAccess is granted based on IP.
Explanation
Setting to 'Deny all' means zero access if not explicitly allowed; the other options contradict the default deny approach.