Zscaler Digital Transformation Administrator Questions and Answers
Which of the following is unrelated to the properties of 'Trusted Networks'?
What are the two types of Probe supported in ZDX?
Which of the following are correct request methods when configuring a URL filtering rule with a Caution action?
Which of the following is a key feature of Zscaler Data Protection?
Which type of malware is specifically used to deliver other malware?
How does Zscaler Risk360 quantify risk?
Which attack type is characterized by a commonly used website or service that has malicious content like malicious JavaScript running on it?
How is the relationship between App Connector Groups and Server Groups created?
When configuring a ZDX custom application and choosing Type: 'Network' and completing the configuration by defining the necessary probe(s), which performance metrics will an administrator NOT get for users after enabling the application?
What does the user risk score enable a user to do?
Which Advanced Threats policy can be configured to protect users against a credential attack?
The security exceptions allow list for Advanced Threat Protection apply to which of the following Policies?
Which Zscaler forwarding mechanism creates a loopback address on the machine to forward the traffic towards Zscaler cloud?
A user is accessing a private application through Zscaler with SSL Inspection enabled. Which certificate will the user see on the browser session?
What is the recommended minimum number of App connectors needed to ensure resiliency?
What is the purpose of a Microtunnel (M-Tunnel) in Zscaler?
When the Zscaler Client Connector launches, which portal does it initially interact with to understand the user's domain and identity provider (IdP)?
Which of the following are types of device posture?
The Security Alerts section of the Alerts dashboard has a graph showing what information?
Fundamental capabilities needed by other services within the Zscaler Zero Trust Exchange are provided by which of these?
Can URL Filtering make use of Cloud Browser Isolation?
What is the primary function of the on-premises VM in the EDM process?
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS includes which of the following?
Which of the following is an open standard used to provide automatic updates of a user's group and department information?
A Import
B. LDAP Sync
C. SCIM
D. SAML
A user has opened a support case to complain about poor user experience when trying to manage their AWS resources. How could a helpdesk administrator get a useful root cause analysis to help isolate the issue in the least amount of time?
Which of the following options will protect against Botnet activity using IPS and Yara type content analysis?
What is the purpose of the Zscaler Client Connector providing the authentication token to the Zscaler Client Connector Portal after it is received from Zscaler Internet Access?
When configuring an inline Data Loss Prevention policy with content inspection, which of the following are used to detect data, allow or block transactions, and notify your organization's auditor when a user's transaction triggers a DLP rule?
What method does Zscaler Identity Threat Detection and Response use to gather information about AD domains?
What does a DLP Engine consist of?
Can Notifications, based on Alert Rules, be sent with methods other than email?
What are the two types of Alert Rules that can be defined?
Layered defense throughout an organization security platform is valuable because of which of the following?
Which of the following is a feature of ITDR (Identity Threat Detection and Response)?
For a deployment using both ZIA and ZPA set of services, what is the best authentication solution?
Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?
How would an administrator retrieve the access token to use the Zscaler One API?