AZero Trust Network Access (ZTNA) connectoris used instead of aservice connectionforprivate application accessbecause it providesautomatic application discovery and policy enforcement.
Discovers Private Applications
TheZTNA connectorautomatically identifiespreviously unknown or unmanagedprivate applications running in adata center or cloud environment.
Suggests Security Policy Rules
After discovering applications, itsuggests appropriate security policiesto control user access, ensuringZero Trust principlesare followed.
Granular Access Control
It enforcesleast-privilege accessand appliesidentity-based security policiesfor private applications.
(A) Controls traffic from the mobile endpoint to any of the organization's internal resources
This describesZTNA enforcement, butdoes not explain why a ZTNA connector is preferred over a service connection.
(B) Functions as the attachment point for IPsec-based connections to remote site or branch networks
This describes aservice connection, which is different from aZTNA connector.
(C) Supports traffic sourced from on-premises or public cloud-based resources to mobile users and remote networks
This aligns more withPrisma Access service connections, not ZTNA connectors.
Zero Trust Architectures– ZTNA ensures that private applications arediscovered, classified, and protected.
Why is ZTNA Connector the Right Choice?Other Answer Choices AnalysisReferences and Justification:Thus,ZTNA Connector (D) is the correct answer, as itautomatically discovers private applications and suggests security policy rules for them.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit