Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Zscaler ZDTA Zscaler Digital Transformation Administrator Exam Practice Test

Demo: 37 questions
Total 125 questions

Zscaler Digital Transformation Administrator Questions and Answers

Question 1

What is the ZIA feature that ensures certain SaaS applications cannot be accessed from an unmanaged device?

Options:

A.

Tenant Restriction

B.

Identity Proxy

C.

Out-of-band Application Access

D.

SaaS Application Access

Question 2

Malware Protection inside HTTPS connections is performed using which parts of the Zero Trust Exchange?

Options:

A.

Deception creating decoy files for malware to discover.

B.

Application Segmentation of users to specific private applications.

C.

TLS Inspection decrypting traffic to compare signatures for known risks.

D.

Data Loss Protection comparing saved filenames for known risks.

Question 3

Which Risk360 key focus area observes a broad range of event, security configurations, and traffic flow attributes?

Options:

A.

External Attack Surface

B.

Prevent Compromise

C.

Data Loss

D.

Lateral Propagation

Question 4

Does the Access Control suite include features that prevent lateral movement?

Options:

A.

No. Access Control Services will only control access to the Internet and cloud applications.

B.

Yes. Controls for segmentation and conditional access are part of the Access Control Services.

C.

Yes. The Cloud Firewall will detect network segments and provide conditional access.

D.

No. The endpoint firewall will detect network segments and steer access.

Question 5

Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?

Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?

Options:

A.

Six - one per data center plus two for cold standby.

B.

Eight -two per data center.

C.

Four - one per data center.

D.

Sixteen - to support a full mesh to the other data centers.

Question 6

How does a Zscaler administrator troubleshoot a certificate pinned application?

Options:

A.

They could look at SSL logs for a failed client handshake.

B.

They could reboot the endpoint device.

C.

They could inspect the ZIA Web Policy.

D.

They could look into the SaaS application analytics tab.

Question 7

What is the default policy configuration setting for checking for Viruses?

Options:

A.

Allow

B.

Block

C.

Unwanted Applications

D.

Malware Protection

Question 8

What ports and protocols are forwarded to the Zero Trust Exchange when Zscaler Client Connector is using Tunnel 2.0?

Options:

A.

TCP ports 80, 443 and 8080 only.

B.

Any HTTP/HTTPS traffic as well as DNS.

C.

All TCP and UDP ports as well as ICMP traffic.

D.

All Web ports as well as FTP and SSH.

Question 9

An administrator needs to SSL inspect all traffic but one specific URL category. The administrator decides to create two policies, one to inspect all traffic and another one to bypass the specific category. What is the logical sequence in which they have to appear in the list?

Options:

A.

Both policies are incompatible, so it is not possible to have them together.

B.

First the policy for the exception Category, then further down the list the policy for the generic "inspect all."

C.

First the policy for the generic "inspect all", then further down the list the policy for the exception Category.

D.

All policies both generic and specific will be evaluated so no specific order is required.

Question 10

What is the default timer in ZDX Advanced for web probes to be sent?

Options:

A.

1 minute

B.

10 minutes

C.

30 minutes

D.

5 minutes

Question 11

Can Notifications, based on Alert Rules, be sent with methods other than email?

Options:

A.

Email is the only method for notifications as that is universally applicable and no other way of sending them makes sense.

B.

In addition to email, text messages can be sent directly to one cell phone to alert the CISO who is then coordinating the work on the incident.

C.

Leading ITSM systems can be connected to the Zero Trust Exchange using a NSS server, which will then connect to ITSM tools and forwards the alert.

D.

In addition to email, notifications, based on Alert Rules, can be shared with leading ITSM or UCAAS tools over Webhooks.

Question 12

Which of the following is a unified management console for internet and SaaS applications, private applications, digital experience monitoring and endpoint agents?

Options:

A.

identity Admin Portal

B.

Mobile Admin Portal

C.

Experience Center

D.

One API

Question 13

While troubleshooting a user's slow application access, can a ZDX administrator see degradations in Wi-Fi signal strength?

Options:

A.

Yes, the Wi-Fi hop latency is shown on a cloud path probe.

B.

Yes. but the current Wi-Fi signal strength is only displayed when doing a deep trace.

C.

No, ZDX only works on hardwired devices.

D.

Yes, a low Wi-Fi signal may be seen in either the results of a Cloud Path Probe or in the device health Wi-Fi signal indicator.

Question 14

What are common delivery mechanisms for malware?

Options:

A.

Malware downloads from web pages

B.

Personal emails, company documents, OneDrive

C.

Spam, exploit kits, USB drives, video streaming

D.

Phishing, Exploit Kits, Watering Holes, Pre-existing Compromise

Question 15

Which of the following methods can be used to notify an end-user of a potential DLP violation in Zscaler’s Workflow Automation solution?

Options:

A.

Notifications in MS Teams / Slack

B.

SMS text message.

C.

Automated phone call.

D Twitter post with custom hashtan

Question 16

What does Advanced Threat Protection defend users from?

Options:

A.

Vulnerable JavaScripts

B.

Large iFrames

C.

Malicious active content

D.

Command injection attacks

Question 17

Which Platform Service enables visibility into the headers and payload of encrypted transactions?

Options:

A.

Policy Framework

B.

TLS Decryption

C.

Reporting and Logging

D.

Device Posture

Question 18

If you're migrating from an on-premises proxy, you will already have a proxy setting configured within the browser or within the system. With Tunnel Mode, the best practice is to configure what type of proxy configuration?

Options:

A.

Execute a GPO update to retrieve the proxy settings from AD.

B.

Enforce no Proxy Configuration.

C.

Use Web Proxy Auto Discovery (WPAD) to auto-configure the proxy.

D.

Use an automatic configuration script (forwarding PAC file).

Question 19

Which are valid criteria for use in Access Policy Rules for ZPA?

Options:

A.

Group Membership, ZIA Risk Score, Domain Joined, Certificate Trust

B.

Username, Trusted Network Status, Password, Location

C.

SCIM Group, Time of Day, Client Type, Country Code

D.

Department, SNI, Branch Connector Group, Machine Group

Question 20

What does an Endpoint refer to in an API architecture?

Options:

A.

An end-user device like a laptop or an OT/IoT device

B.

A URL providing access to a specific resource

C.

Zscaler public service edges

D.

Zscaler API gateway providing access to various components

Question 21

Layered defense throughout an organization security platform is valuable because of which of the following?

Options:

A.

Layered defense increases costs to attackers to operate.

B.

Layered defense from multiple vendor solutions easily share attacker data.

C.

Layered defense ensures attackers are prevented eventually.

D.

Layered defense with multiple endpoint agents protects from attackers.

Question 22

What does the user risk score enable a user to do?

Options:

A.

Compare the user risk score with other companies to evaluate users vs other companies.

B.

Determine whether or not a user is authorized to view unencrypted data.

C.

Configure stronger user-specific policies to monitor & control user-level risk exposure.

D.

Determine if a user has been compromised

Question 23

You recently deployed an additional App Connector to and existing app connector group. What do you need to do before starting the zpa-connector service?

Options:

A.

Copy the group provisioning key to /opt/zscaler/var/provision key

B.

Monitor the peak CPU and memory utilization of the AC

C.

Schedule periodic software updates for the agg connector group

D.

Check the status of the new App Connector in the administration portal

Question 24

How is the relationship between App Connector Groups and Server Groups created?

Options:

A.

The relationship between Agp_ Connector Groups and Server Groups is established dynamically in the Zero Trust Exchange as users try to access Applications

B.

When a new Server Group is created it points to the Agp_ Connector Groups that provide visibility to this Server Group

C.

Both Agg Connector Groups and Server Groups are linked together via the Data Center element

D.

When you create a new Agg Connector Group you must select the list of Server Groups to which it provides visibility

Question 25

What conditions can be referenced for Trusted Network Detection?

Options:

A.

Hostname Resolution, Network Adapter IP, Default Gateway

B.

DNS Servers, DNS Search Domain, Network Adapter IP

C.

Hostname Resolution, DNS Servers, Geo Location

D.

DNS Search Domain, DNS Server, Hostname Resolution

Question 26

For a deployment using both ZIA and ZPA set of services, what is the best authentication solution?

Options:

A.

Use forms Authentication in ZPA and SAML in ZIA

B.

Use forms Authentication in ZIA and SAML in ZPA

C.

Configure Authentication using SAML on both ZIA and ZPA

D.

Use forms Authentication for both ZIA and ZPA

Question 27

What is the main purpose of Sandbox functionality?

Options:

A.

Block malware that we have previously identified

B.

Build a test environment where we can evaluate the result of policies

C.

Identify Zero-Day Threats

D.

Balance thread detection across customers around the world

Question 28

In which of the following SaaS apps can you protect data at rest via Zscaler's out-of-band CASB solution?

Options:

A.

Yahoo Mail

B.

Twitter.

C.

Google Drive.

D.

Facebook.

Question 29

When configuring Applications to be monitored, what probe types can be created?

Options:

A.

Page Fetch Time Probe and Cloud Path Probe

B.

Web Probe and Page Fetch Time Probe

C.

Page Fetch Time Probe and Server Response time Probe

D.

Web Probe and Cloud Path Probe

Question 30

Which of the following components is installed on an endpoint to connect users to the Zero Trust Exchange regardless of their location - home, work, while traveling, etc.?

Options:

A.

Client connector

B.

Private Service Edge

C.

IPSec/GRE Tunnel

D.

App Connector

Question 31

What happens after the Zscaler Client Connector receives a valid SAML response from the Identity Provider (IdP)?

Options:

A.

The Zscaler Client Connector Portal authenticates the user directly.

B.

There is no need for further actions as the SAML is valid, access is granted immediately.

C.

The SAML response is sent back to the user’s device for local validation.

D.

Zscaler Internet Access validates the SAML response and returns an authentication token.

Question 32

A user is accessing a private application through Zscaler with SSL Inspection enabled. Which certificate will the user see on the browser session?

Options:

A.

No certificate, as the session is decrypted by the Service Edge

B.

A self-signed certificate from Zscaler

C.

Real Server Certificate

D.

Zscaler generated MITM Certificate

Question 33

SSH use or tunneling was detected and blocked by which feature?

Options:

A.

Cloud Agg Control

B.

URL Filtering

C.

Advanced Threat Protection

D Mobile Malware Protection

Question 34

Which list of protocols is supported by Zscaler for Privileged Remote Access?

Options:

A.

RDP, VNC and SSH

B.

RDP, SSH and DHCP

C.

SSH, DNS and DHCP

D.

RDP, DNS and VNC

Question 35

When configuring Zscaler Private Access, what is the function of the Server Group?

Options:

A.

Maps FQDNs to IP Addresses

B.

Maps Applications to FQDNs

C.

Maps App Connector Groups to Application Segments

D.

Maps Applications to Application Groups

Question 36

Which SaaS platform is supported by Zscaler's SaaS Security Posture Management (SSPM)?

Options:

A.

Amazon S3

B.

Webex Teams

C.

Dropbox

D.

Google Workspace

Question 37

What is the purpose of a Microtunnel (M-Tunnel) in Zscaler?

Options:

A.

To provide an end-to-end communication channel between ZCC clients

B.

To provide an end-to-end communication channel to Microsoft Applications such as M365

C.

To create an end-to-end communication channel to Azure AD for authentication

D.

To create an end-to-end communication channel to internal applications

Demo: 37 questions
Total 125 questions