Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Zscaler ZDTA Dumps Questions Answers

Page: 1 / 9
Total 125 questions

Zscaler Digital Transformation Administrator Questions and Answers

Question 1

Which of the following is unrelated to the properties of 'Trusted Networks'?

Options:

A.

DNS Server

B.

Default Gateway

C.

Org ID

D.

Network Range

Buy Now
Question 2

Which list of protocols is supported by Zscaler for Privileged Remote Access?

Options:

A.

RDP, VNC and SSH

B.

RDP, SSH and DHCP

C.

SSH, DNS and DHCP

D.

RDP, DNS and VNC

Question 3

Which attack type is characterized by a commonly used website or service that has malicious content like malicious JavaScript running on it?

Options:

A.

Watering Hole Attack

B.

Pre-existing Compromise

C.

Phishing Attack

D.

Exploit Kits

Question 4

What does an Endpoint refer to in an API architecture?

Options:

A.

An end-user device like a laptop or an OT/IoT device

B.

A URL providing access to a specific resource

C.

Zscaler public service edges

D.

Zscaler API gateway providing access to various components

Question 5

How does a Zscaler administrator troubleshoot a certificate pinned application?

Options:

A.

They could look at SSL logs for a failed client handshake.

B.

They could reboot the endpoint device.

C.

They could inspect the ZIA Web Policy.

D.

They could look into the SaaS application analytics tab.

Question 6

What does Zscaler Advanced Firewall support that Zscaler Standard Firewall does not?

Options:

A.

Destination NAT

B.

FQDN Filtering with wildcard

C.

DNS Dashboards, Insights and Logs

D.

DNS Tunnel and DNS Application Control

Question 7

Is SCIM required for ZIA?

Options:

A.

Depends

B.

Maybe

C.

No

D.

Yes

Question 8

As technology that exists for a very long period of time, has URL Filtering lost its effectiveness?

Options:

A.

URL Filter is the most commonly used web filtering technique in the arsenal. It acts as first line of defense.

B.

In a modern cloud world, access to all Internet sites and cloud applications should be granted by default. URL Filtering is no longer needed.

C.

URL Filtering has been replaced by CASB functionality through blocking access to all Internet sites and only allowing a few corporate applications.

D.

URL Filtering is outdated and no longer needed. The rise of HTTPS leads renders URL Filtering ineffective as all traffic is encrypted.

Question 9

Which of the following methods can be used to notify an end-user of a potential DLP violation in Zscaler’s Workflow Automation solution?

Options:

A.

Notifications in MS Teams / Slack

B.

SMS text message.

C.

Automated phone call.

D Twitter post with custom hashtan

Question 10

Which Advanced Threat Protection feature restricts website access by geographic location?

Options:

A.

Spyware Callback

B.

Botnet Protection

C.

Blocked Countries

D.

Browser Exploits

Question 11

According to the Zero Trust Exchange Functional Services Diagram, which services does Antivirus belong to?

Options:

A.

Platform Services

B.

Access Control Services

C.

Security Services

D.

Advanced Threat Prevention Services

Question 12

What is the immediate outcome or effect when the Zscaler Office 365 One Click Rule is enabled?

Options:

A.

All traffic undergoes mandatory SSL inspection.

B.

Office 365 traffic is exempted from SSL inspection and other web policies.

C.

Non-Office 365 traffic is blocked.

D.

All Office 365 drive traffic is blocked.

Question 13

Which of the following is a common use case for adopting Zscaler’s Data Protection?

Options:

A.

Reduce your Internet Attack Surface

B.

Prevent download of Malicious Files

C.

Prevent loss to Internet and Cloud Apps

D.

Securely connect users to Private Applications

Question 14

Which Advanced Threats policy can be configured to protect users against a credential attack?

Options:

A.

Configure Advanced Cloud Sandbox policies.

B.

Block Suspected phishing sites.

C.

Enable Watering Hole detection.

D.

Block Windows executable files from uncategorized websites.

Question 15

A user is accessing a private application through Zscaler with SSL Inspection enabled. Which certificate will the user see on the browser session?

Options:

A.

No certificate, as the session is decrypted by the Service Edge

B.

A self-signed certificate from Zscaler

C.

Real Server Certificate

D.

Zscaler generated MITM Certificate

Question 16

What are the two types of Probe supported in ZDX?

Options:

A.

Web Probes and Cloud Path Probes

B.

Application Probes and Network Probes

C.

Page Speed Probes and Connection Speed Probes

D.

SSaas Probes and Router Probes

Question 17

If you're migrating from an on-premises proxy, you will already have a proxy setting configured within the browser or within the system. With Tunnel Mode, the best practice is to configure what type of proxy configuration?

Options:

A.

Execute a GPO update to retrieve the proxy settings from AD.

B.

Enforce no Proxy Configuration.

C.

Use Web Proxy Auto Discovery (WPAD) to auto-configure the proxy.

D.

Use an automatic configuration script (forwarding PAC file).

Question 18

Which Zscaler feature detects whether an intruder is accessing your internal resources?

Options:

A.

SandBox

B.

SSL Decryption Bypass

C.

Browser Isolation

D.

Deception

Question 19

What is the main purpose of Sandbox functionality?

Options:

A.

Block malware that we have previously identified

B.

Build a test environment where we can evaluate the result of policies

C.

Identify Zero-Day Threats

D.

Balance thread detection across customers around the world

Question 20

What does a DLP Engine consist of?

Options:

A.

DLP Policies

B.

DLP Rules

C.

DLP Dictionaries

D.

DLP Identifiers

Question 21

How does Zscaler Risk360 quantify risk?

Options:

A.

The number of risk events is totaled by location and combined.

B.

A risk score is computed based on the number of remediations needed compared to the industry peer average.

C.

Time to mitigate each identified risk is totaled, averaged, and tracked to show ongoing trends.

D.

A risk score is computed for each of the four stages of breach.

Question 22

Which feature does Zscaler Client Connector Z-Tunnel 2.0 enable over Z-Tunnel 1.0?

Options:

A.

Enables SSL Inspection for Client Connector

B.

Inspection of all ports and protocols via Cloud Firewall

C.

Enables Browser Isolation

D.

Enables multicast traffic

Question 23

Which of the following is an unsupported tunnel type?

Options:

A.

Generic Routing and Encapsulation (GRE)

B.

HTTP Connect Tunnels

C.

Proprietary Microtunnels

D.

Secure Socket Tunneling Protocol (SSTP)

Question 24

When configuring an inline Data Loss Prevention policy with content inspection, which of the following are used to detect data, allow or block transactions, and notify your organization's auditor when a user's transaction triggers a DLP rule?

Options:

A.

Hosted PAC Files

B.

Index Tool

C.

DLP engines

D.

VPN Credentials

Question 25

What is the scale used to represent a users Zscaler Digital Experience (ZDX) score?

Options:

A.

1-100

B.

1-10

C.

1 - 1000

D.

0 - 50

Question 26

From a user perspective, Zscaler Bandwidth Control performs traffic shaping and buffering on what direction(s) of traffic?

Options:

A.

Outbound traffic is shaped. Inbound or localhost traffic is unshaped.

B.

Outbound or inbound traffic is shaped. Localhost traffic is unshaped.

C.

Inbound traffic is shaped. Outbound or localhost traffic is unshaped.

D.

Localhost traffic is shaped. Outbound or Inbound traffic is unshaped.

Question 27

When configuring Zscaler Private Access, what is the function of the Server Group?

Options:

A.

Maps FQDNs to IP Addresses

B.

Maps Applications to FQDNs

C.

Maps App Connector Groups to Application Segments

D.

Maps Applications to Application Groups

Question 28

In support of data privacy about TLS/SSL inspection, when you subscribe to ZIA, you enter into what kind of agreement?

Options:

A.

Zscaler Compliance Policy

B.

Zscaler Privacy Policy

C.

Acceptable Use Policy

D.

Zscaler Data Processing Agreement

Question 29

What is a ZIA Sublocation?

Options:

A.

The section of a corporate Location used to separate traffic, like traffic from employees from guest traffic

B.

The section of a corporate Location that sends traffic to a Subcloud

C.

Every one of the sections in a Corporate Location that use overlapping IP addresses

D.

A way to separate generic traffic from that coming from Client Connector

Question 30

When filtering user access to certain web destinations what can be a better option, URL or Cloud Application filtering Policies?

Options:

A.

Cloud Application policies provide better access control.

B.

URL filtering policies provide better access control.

C.

Wherever possible URL policies are recommended.

D.

Both provide the same filtering capabilities.

Question 31

Fundamental capabilities needed by other services within the Zscaler Zero Trust Exchange are provided by which of these?

Options:

A.

Access Control Services

B.

Digital Experience Monitoring

C.

Cyber Security Services

D.

Platform Services

Question 32

The Security Alerts section of the Alerts dashboard has a graph showing what information?

Options:

A.

Top 5 Malware Programs Detected

B.

Top 5 Viruses by Region

C.

Top 5 Threats by Systems Impacted

D.

Top 5 Unified Threat Yara Options

Question 33

What is the ZIA feature that ensures certain SaaS applications cannot be accessed from an unmanaged device?

Options:

A.

Tenant Restriction

B.

Identity Proxy

C.

Out-of-band Application Access

D.

SaaS Application Access

Question 34

SSH use or tunneling was detected and blocked by which feature?

Options:

A.

Cloud Agg Control

B.

URL Filtering

C.

Advanced Threat Protection

D Mobile Malware Protection

Question 35

Zscaler Data Protection supports custom dictionaries.

What actions can administrators take with these dictionaries to protect data in motion?

Options:

A.

Define specific keywords, phrases, or patterns relevant to their organization's sensitive data policy.

B.

Define specific governance and regulations relevant to their organization's sensitive data policy.

C.

Define specific SaaS tenant relevant to their organization's sensitive data policy

D.

Define specific file types relevant to their organization's sensitive data policy.

Question 36

Which of the following is a valid action for a SaaS Security API Data Loss Prevention Rule?

Options:

A.

Enable AI/ML based Smart Browser Isolation

B.

Quarantine Mai ware

C.

Create Zero Trust Network Decoy

D.

Remove External Collaborators and Sharable Link

Question 37

Zscaler forwards the server SSL/TLS certificate directly to the user's browser session in which situation?

Options:

A.

When traffic contains a known threat signature.

B.

When web traffic is on custom TCP ports.

C.

When traffic is exempted in SSL Inspection policy rules.

D.

When user has connected to server in the past.

Page: 1 / 9
Total 125 questions