Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the Zscaler Digital Transformation Administrator ZDTA Questions and answers with Dumpstech

Exam ZDTA Premium Access

View all detail and faqs for the ZDTA exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions
Questions # 41:

When configuring Zscaler Private Access, what is the function of the Server Group?

Options:

A.

Maps FQDNs to IP Addresses

B.

Maps Applications to FQDNs

C.

Maps App Connector Groups to Application Segments

D.

Maps Applications to Application Groups

Questions # 42:

Zscaler detection and response alerts can be forwarded to external systems through which methods?

Options:

A.

Only via command-line scripts

B.

Manual log downloads uploaded to external tools

C.

Built-in Zscaler-only tools with no external integrations

D.

Email or webhook support to third-party applications

Questions # 43:

If you're migrating from an on-premises proxy, you will already have a proxy setting configured within the browser or within the system. With Tunnel Mode, the best practice is to configure what type of proxy configuration?

Options:

A.

Execute a GPO update to retrieve the proxy settings from AD.

B.

Enforce no Proxy Configuration.

C.

Use Web Proxy Auto Discovery (WPAD) to auto-configure the proxy.

D.

Use an automatic configuration script (forwarding PAC file).

Questions # 44:

What ports and protocols are forwarded to the Zero Trust Exchange when Zscaler Client Connector is using Tunnel 2.0?

Options:

A.

TCP ports 80, 443 and 8080 only.

B.

Any HTTP/HTTPS traffic as well as DNS.

C.

All TCP and UDP ports as well as ICMP traffic.

D.

All Web ports as well as FTP and SSH.

Questions # 45:

When configuring an inline Data Loss Prevention policy with content inspection, which of the following are used to detect data, allow or block transactions, and notify your organization's auditor when a user's transaction triggers a DLP rule?

Options:

A.

Hosted PAC Files

B.

Index Tool

C.

DLP engines

D.

VPN Credentials

Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions