Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the Zscaler Digital Transformation Administrator ZDTA Questions and answers with Dumpstech

Exam ZDTA Premium Access

View all detail and faqs for the ZDTA exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions
Questions # 31:

What are the two types of Alert Rules that can be defined?

Options:

A.

ThreatLabZ pre-defined and customer defined

B.

Snort defined and 3rd party defined

C.

ThreatLabZ pre-defined and 3rd party defined

D.

Customer defined and 3rd party defined

Questions # 32:

Which field within a URL filtering rule must be defined for Browser Isolation to work?

Options:

A.

Groups

B.

User Agent

C.

Departments

D.

Device Trust

Questions # 33:

When configuring a ZDX custom application and choosing Type: 'Network' and completing the configuration by defining the necessary probe(s), which performance metrics will an administrator NOT get for users after enabling the application?

Options:

A.

Server Response Time

B.

ZDX Score

C.

Client Gateway IP Address

D.

Disk I/O

Questions # 34:

Which type of attack plants malware on commonly accessed services?

Options:

A.

Remote access trojans

B.

Phishing

C.

Exploit kits

D.

Watering hole attack

Questions # 35:

Which of the following is a valid action for a SaaS Security API Data Loss Prevention Rule?

Options:

A.

Enable AI/ML based Smart Browser Isolation

B.

Quarantine Malware

C.

Create Zero Trust Network Decoy

D.

Remove External Collaborators and Sharable Link

Questions # 36:

A user has opened a support case to complain about poor user experience when trying to manage their AWS resources. How could a helpdesk administrator get a useful root cause analysis to help isolate the issue in the least amount of time?

Options:

A.

Check the Zscaler Trust page for any indications of cloud outages or incidents that would be causing a slowdown.

B.

Check the user's ZDX score for a period of low score for AWS and use Analyze Score to get the ZDX Y-Engine analysis.

C.

Do a Deep Trace on the user's traffic and check for excessive DNS resolution times and other slowdowns.

D.

Initiate a packet capture from Zscaler Client Connector and escalate the case to have the trace analyzed for root cause.

Questions # 37:

The Security Alerts section of the Alerts dashboard has a graph showing what information?

Options:

A.

Top 5 Malware Programs Detected

B.

Top 5 Viruses by Region

C.

Top 5 Threats by Systems Impacted

D.

Top 5 Unified Threat Yara Options

Questions # 38:

Malware Protection inside HTTPS connections is performed using which parts of the Zero Trust Exchange?

Options:

A.

Deception creating decoy files for malware to discover.

B.

Application Segmentation of users to specific private applications.

C.

TLS Inspection decrypting traffic to compare signatures for known risks.

D.

Data Loss Protection comparing saved filenames for known risks.

Questions # 39:

The security exceptions allow list for Advanced Threat Protection apply to which of the following Policies?

Options:

A.

Sandbox

B.

URL Filtering

C.

File Type Control

D.

IPS Control

Questions # 40:

Which of the following are types of device posture?

Options:

A.

Detect Crowdstrike, Crowdstrike ZTA score, First name

B.

Certificate Trust, File Path, Full Disk Encryption

C.

Domain Joined, Process Check, Deception Check

D.

Unauthorized Modification, OS Version, License Key

Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions