The correct answer is C. Enforce Policy. In the Zscaler Zero Trust model, the architecture is built around three major functions: verify identity and context , control content and access , and enforce policy . Verification establishes who the user is and the conditions of the request, including factors such as device posture, location, group membership, and other contextual signals. Zscaler documentation states that policy assignment evaluates the user, machine, location, and more to determine which policies should apply.
After verification, the platform controls access and content by inspecting and evaluating the connection, the application, and the traffic according to defined business and security requirements. The third step is enforcement, where the system applies the exact result for that specific request, such as allowing, blocking, restricting, isolating, or otherwise controlling the transaction. Zscaler’s architecture also describes using a cloud service to enforce contextual policies and emphasizes that users connect directly to applications, not the network.
The other options are supporting technologies or specific capabilities, but they do not represent the third major architecture section. The correct completion is therefore Enforce Policy .