Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the Zscaler Digital Transformation Administrator ZDTA Questions and answers with Dumpstech

Exam ZDTA Premium Access

View all detail and faqs for the ZDTA exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions
Questions # 11:

A user is accessing a private application through Zscaler with SSL Inspection enabled. Which certificate will the user see on the browser session?

Options:

A.

No certificate, as the session is decrypted by the Service Edge

B.

A self-signed certificate from Zscaler

C.

Real Server Certificate

D.

Zscaler generated MITM Certificate

Questions # 12:

Which is an example of Inline Data Protection?

Options:

A.

Preventing the copying of a sensitive document to a USB drive.

B.

Preventing the sharing of a sensitive document in OneDrive.

C.

Analyzing a customer’s M365 tenant for security best practices.

D.

Blocking the attachment of a sensitive document in webmail.

Questions # 13:

What is the default timer in ZDX Advanced for web probes to be sent?

Options:

A.

1 minute

B.

10 minutes

C.

30 minutes

D.

5 minutes

Questions # 14:

What is the immediate outcome or effect when the Zscaler Office 365 One Click Rule is enabled?

Options:

A.

All traffic undergoes mandatory SSL inspection.

B.

Office 365 traffic is exempted from SSL inspection and other web policies.

C.

Non-Office 365 traffic is blocked.

D.

All Office 365 drive traffic is blocked.

Questions # 15:

Which step has a default frequency of two hours in the Zscaler client connector process?

Options:

A.

Policy update check

B.

PAC File Download

C.

Software update policy check

D.

Refresh on Network Changes

Questions # 16:

What does Zscaler Advanced Firewall support that Zscaler Standard Firewall does not?

Options:

A.

Destination NAT

B.

FQDN Filtering with wildcard

C.

DNS Dashboards, Insights and Logs

D.

DNS Tunnel and DNS Application Control

Questions # 17:

What is one of the four steps of a cyber attack?

Options:

A.

Find Cash Safe

B.

Find Email Addresses

C.

Find Least Secure Office Building

D.

Find Attack Surface

Questions # 18:

What happens after the Zscaler Client Connector receives a valid SAML response from the Identity Provider (IdP)?

Options:

A.

The Zscaler Client Connector Portal authenticates the user directly.

B.

There is no need for further actions as the SAML is valid, access is granted immediately.

C.

The SAML response is sent back to the user’s device for local validation.

D.

Zscaler Internet Access validates the SAML response and returns an authentication token.

Questions # 19:

How is data gathered with ZDX Advanced client performance?

Options:

A.

By generating synthetic transactions to designated Internet and Private applications every 5 minutes and measuring the performance of those sessions.

B.

By constantly analyzing live user sessions to both Internet and Private applications and measuring the performance of those sessions.

C.

By using AI predictive analysis ZDX can extrapolate near-term client performance based upon recent past data observed.

D.

By constantly analyzing live user sessions to critical SaaS applications and measuring the performance of those sessions.

Questions # 20:

Zscaler Advanced Threat Protection (ATP) is a key capability within Zscaler Internet Access (ZIA), protecting users against attacks such as phishing. Which of the following is NOT part of the ATP workflow?

Options:

A.

IPS coverages for client-side and server-side

B.

Reporting high latency from the CEO's Teams call due to a low Wi-Fi signal

C.

Comprehensive URL categories for newly registered domains

D.

Preventing the download of a password protected zip file

Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions