How are services protected in a legacy scenario when they are discoverable on the public Internet? (Select all that apply)
Answer : A, C, D
The correct answers are A, C, and D. In a legacy architecture, applications that are exposed and discoverable on the public Internet are usually protected by building a DMZ (demilitarized zone) and placing multiple security technologies in front of the service. This commonly includes a large security stack made up of separate appliances or services for functions such as load balancing, firewalling, distributed denial-of-service (DDoS) protection, and related edge security controls. A web application firewall (WAF) is also a standard protective element in these public-facing designs because it adds inspection and protection for web-based attack patterns and internet-originated abuse.
Option B, DAST, is not a correct answer because Dynamic Application Security Testing is a testing and assessment method, not a live architectural protection control that sits inline to defend exposed services in production. Zero Trust architecture contrasts with this legacy model by removing direct public discoverability and reducing dependence on a complex exposed edge stack. Instead of defending openly exposed applications with layered perimeter tools, Zero Trust aims to make applications less discoverable and access more identity- and policy-driven.
One example of accessing different types of services based on a differentiator of identity is:
Answer : C
The correct answer is C. In Zero Trust architecture, access is determined not only by who the user is, but also by the context of the device and access method. Zscaler documentation explains that policy assignment evaluates the user, machine, location, group, and more to determine which policies apply. It also states that Zero Trust access decisions can consider device posture and whether access is being requested under trusted or untrusted conditions.
A browser session from an untrusted device and a session from a device running Zscaler Client Connector represent two different identity-and-context states. The user identity may be the same, but the device trust and posture are different, so the available services and the enforcement outcome can differ. This is exactly how Zero Trust should work: access is tailored to the verified context of the request rather than granted broadly through network location. The other options do not represent a meaningful Zero Trust identity differentiator. An open-access VPN policy is contrary to Zero Trust, wired versus wireless is primarily a network transport distinction, and MSP management is unrelated to the access decision itself. Therefore, the best answer is C.
If you take a database from your data center and move it into the cloud, one of the legacy mechanisms for providing access is to: (Select 2)
Answer : C, D
The correct answers are C and D. In legacy architectures, when an application or database is moved from a private data center to a cloud environment, access is often preserved by extending the existing network-centric trust model. One common method is to give the workload a public IP address so it can be reached directly over the internet. Another is to extend MPLS or other routable WAN connectivity into the cloud so that the application remains part of an IP-reachable enterprise network. These are classic legacy approaches because they preserve network reachability instead of shifting to identity-based, application-specific access.
By contrast, Zscaler's Zero Trust guidance states that users should access applications without sharing network context or routing domain with them. The user can be anywhere, the application can be hosted anywhere, and policy should be granular and context-based, not dependent on exposing services on a routable network. That is why direct internet exposure and MPLS-style extension are considered legacy methods, while Zero Trust replaces them with brokered, application-aware access that minimizes discoverability and lateral movement.
How is policy enforcement in Zero Trust done?
Answer : C
In Zero Trust architecture, policy enforcement is conditional and context-based, not limited to a simple binary allow-or-block model. Zscaler's reference architectures explain that policy is evaluated using the full user context, including identity, device posture, location, group membership, and other conditions. Access decisions are therefore based on whether specific policy conditions are true, rather than only on static network attributes such as source IP address. For example, the same authenticated user may be allowed access from a managed device at headquarters but denied from an airport, even with the same credentials.
Zscaler documentation also shows that Zero Trust policy can go beyond simple pass or deny outcomes by applying additional controls. In DNS Security and Control, requests can be allowed, blocked, or modified. In ZIA policy development, Cloud App controls allow more granular outcomes than standard allow/block, such as restricting specific actions, applying quotas, or controlling what a user can do inside an application. This reflects the Zero Trust principle that enforcement is adaptive, granular, and tied to business and security context rather than network location alone.
If an enterprise is protecting its services at a network level, such as using firewalls, what happens to that protection when a user leaves the network? (Select 2)
Answer : A, D
The correct answers are A and D. In a legacy, network-based protection model, security controls such as firewalls are tied to the enterprise network perimeter. When a user leaves that network, the user typically loses direct access to internal services because the protection model assumes the user is on the trusted network or connected into it. To restore access, the organization usually has to establish a path back into the network, most commonly through a virtual private network (VPN) or another routable connection. Zscaler's Zero Trust guidance contrasts directly with this legacy pattern by stating that users should access applications without sharing network context with them.
This is one of the reasons Zero Trust replaces legacy VPN-centric design. ZPA documentation explicitly contrasts Zero Trust with legacy VPNs and firewalls by emphasizing that users connect directly to applications, not the network, thereby minimizing attack surface and removing dependence on being ''inside'' the network. Therefore, in a network-level protection model, once the user leaves the network, access is not naturally preserved; instead, access is lost unless a path such as VPN is put in place. The TCP keepalive option is unrelated, and unrestricted internet access to services would contradict the private, firewall-protected network design.
Enterprises can deliver full security controls inline, without needing to decrypt traffic.
Answer : B
The correct answer is B. False. In Zero Trust architecture, full inline security depends on the ability to inspect what is actually inside the traffic flow, not just the fact that a connection exists. When traffic is encrypted, security services cannot fully evaluate malware, command-and-control traffic, sensitive data movement, risky application behavior, or policy violations unless the traffic is decrypted and inspected. Zscaler's TLS/SSL inspection guidance makes this clear by positioning decryption as essential for complete visibility and enforcement across encrypted internet traffic.
Without decryption, an organization may still apply limited controls such as destination reputation, IP-based filtering, category decisions, or metadata-based enforcement. However, that is not the same as full security controls inline. Full Zero Trust protection requires deeper visibility into content and transactions so that threat prevention, Data Loss Prevention (DLP), cloud application controls, sandboxing, and other advanced protections can be applied accurately. Because modern traffic is heavily encrypted, failing to decrypt creates blind spots and weakens policy enforcement. Therefore, the statement is false: enterprises cannot deliver full inline security controls across encrypted traffic without decryption.
What facilitates constant and uniform application of policy enforcement?
Answer : B
The correct answer is B. A core Zero Trust principle is that policy should be consistent and context-based, regardless of where the user is, where the application is hosted, or where the enforcement service is located. In other words, the same business and security policy must be applied uniformly across all access requests, with outcomes changing only when the evaluated context changes. This creates predictable and repeatable enforcement across branches, campuses, home offices, mobile users, and cloud-hosted applications.
Legacy environments often struggle with this because different firewalls, VPN gateways, and security stacks may each enforce only part of the intended rule set, leading to drift and inconsistency. Zero Trust addresses that by moving toward a centralized, policy-driven control model that is applied equally across the distributed environment. Communication between teams is important operationally, but it is not what fundamentally enables constant and uniform enforcement. Traditional appliances and on-premises security stacks also do not solve the consistency problem at scale. Therefore, the best answer is that uniform enforcement is facilitated when the same conditional policy is applied equally regardless of the enforcement point's location.