As a connection goes through, the Zero Trust Exchange:
The correct answer is A. In Zscaler's architecture, the Zero Trust Exchange is not just a packet-forwarding firewall or a single appliance. It is the cloud-delivered policy and security fabric that evaluates access through the core Zero Trust sequence of verify, control, and enforce. The architecture documents describe Zero Trust access as depending on establishing identity, evaluating context, and then applying the appropriate control for that specific request. ZPA guidance explains that users are evaluated for context such as location, device posture, groups, and time of day, and access is granted only if the request matches the required policies.
Option B is incorrect because the Zero Trust Exchange is not limited to a hardened enterprise data center appliance. Option C is incorrect because Zscaler explicitly provides inline controls such as firewalling, DLP, and related inspection services. Option D is also incomplete because the Zero Trust Exchange does more than pass traffic through; it makes access and security decisions. Therefore, the best architecture-aligned answer is that the Zero Trust Exchange carries out the Zero Trust process of Verify, Control, and Enforce as part of completing the transaction.
Currently there are no comments in this discussion, be the first to comment!