Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Zscaler ZDTA Dumps

Page: 1 / 13
Total 125 questions

Zscaler Digital Transformation Administrator Questions and Answers

Question 1

Which of the following is unrelated to the properties of 'Trusted Networks'?

Options:

A.

DNS Server

B.

Default Gateway

C.

Org ID

D.

Network Range

Question 2

What are the two types of Probe supported in ZDX?

Options:

A.

Web Probes and Cloud Path Probes

B.

Application Probes and Network Probes

C.

Page Speed Probes and Connection Speed Probes

D.

SSaas Probes and Router Probes

Question 3

Which of the following are correct request methods when configuring a URL filtering rule with a Caution action?

Options:

A.

Connect, Get, Head

B.

Options, Delete, Put

C.

Get, Delete, Trace

D.

Connect, Post, Put

Question 4

Which of the following is a key feature of Zscaler Data Protection?

Options:

A.

Data loss prevention

B.

Stopping reconnaissance attacks

C.

DDoS protection

D.

Log analysis

Question 5

Which type of malware is specifically used to deliver other malware?

Options:

A.

RAT

B.

Maldocs

C.

Downloaders

D.

Exploitation tool

Question 6

How does Zscaler Risk360 quantify risk?

Options:

A.

The number of risk events is totaled by location and combined.

B.

A risk score is computed based on the number of remediations needed compared to the industry peer average.

C.

Time to mitigate each identified risk is totaled, averaged, and tracked to show ongoing trends.

D.

A risk score is computed for each of the four stages of breach.

Question 7

Which attack type is characterized by a commonly used website or service that has malicious content like malicious JavaScript running on it?

Options:

A.

Watering Hole Attack

B.

Pre-existing Compromise

C.

Phishing Attack

D.

Exploit Kits

Question 8

How is the relationship between App Connector Groups and Server Groups created?

Options:

A.

The relationship between Agp_ Connector Groups and Server Groups is established dynamically in the Zero Trust Exchange as users try to access Applications

B.

When a new Server Group is created it points to the Agp_ Connector Groups that provide visibility to this Server Group

C.

Both Agg Connector Groups and Server Groups are linked together via the Data Center element

D.

When you create a new Agg Connector Group you must select the list of Server Groups to which it provides visibility

Question 9

When configuring a ZDX custom application and choosing Type: 'Network' and completing the configuration by defining the necessary probe(s), which performance metrics will an administrator NOT get for users after enabling the application?

Options:

A.

Server Response Time

B.

ZDX Score

C.

Client Gateway IP Address

D.

Disk I/O

Question 10

What does the user risk score enable a user to do?

Options:

A.

Compare the user risk score with other companies to evaluate users vs other companies.

B.

Determine whether or not a user is authorized to view unencrypted data.

C.

Configure stronger user-specific policies to monitor & control user-level risk exposure.

D.

Determine if a user has been compromised

Question 11

Which Advanced Threats policy can be configured to protect users against a credential attack?

Options:

A.

Configure Advanced Cloud Sandbox policies.

B.

Block Suspected phishing sites.

C.

Enable Watering Hole detection.

D.

Block Windows executable files from uncategorized websites.

Question 12

The security exceptions allow list for Advanced Threat Protection apply to which of the following Policies?

Options:

A.

Sandbox

B.

URL Filtering

C.

File Type Control

D.

IPS Control

Question 13

Which Zscaler forwarding mechanism creates a loopback address on the machine to forward the traffic towards Zscaler cloud?

Options:

A.

Enforced PAC mode

B.

ZTunnel - Packet Filter Based

C.

ZTunnel with Local Proxy

D.

ZTunnel - Route Based

Question 14

A user is accessing a private application through Zscaler with SSL Inspection enabled. Which certificate will the user see on the browser session?

Options:

A.

No certificate, as the session is decrypted by the Service Edge

B.

A self-signed certificate from Zscaler

C.

Real Server Certificate

D.

Zscaler generated MITM Certificate

Question 15

What is the recommended minimum number of App connectors needed to ensure resiliency?

Options:

A.

2

B.

6

C.

4

D.

3

Question 16

What is the purpose of a Microtunnel (M-Tunnel) in Zscaler?

Options:

A.

To provide an end-to-end communication channel between ZCC clients

B.

To provide an end-to-end communication channel to Microsoft Applications such as M365

C.

To create an end-to-end communication channel to Azure AD for authentication

D.

To create an end-to-end communication channel to internal applications

Question 17

When the Zscaler Client Connector launches, which portal does it initially interact with to understand the user's domain and identity provider (IdP)?

Options:

A.

Zscaler Private Access (ZPA) Portal

B.

Zscaler Central Authority

C.

Zscaler Internet Access (ZIA) Portal

D.

Zscaler Client Connector Portal

Question 18

Which of the following are types of device posture?

Options:

A.

Detect Crowdstrike, Crowdstrike ZTA score, First name

B.

Certificate Trust, File Path, Full Disk Encryption

C.

Domain Joined, Process Check, Deception Check

D.

Unauthorized Modification, OS Version, License Key

Question 19

The Security Alerts section of the Alerts dashboard has a graph showing what information?

Options:

A.

Top 5 Malware Programs Detected

B.

Top 5 Viruses by Region

C.

Top 5 Threats by Systems Impacted

D.

Top 5 Unified Threat Yara Options

Question 20

Fundamental capabilities needed by other services within the Zscaler Zero Trust Exchange are provided by which of these?

Options:

A.

Access Control Services

B.

Digital Experience Monitoring

C.

Cyber Security Services

D.

Platform Services

Question 21

Can URL Filtering make use of Cloud Browser Isolation?

Options:

A.

No. Cloud Browser Isolation is a separate platform.

B.

No. Cloud Browser Isolation is only a feature of Advanced Threat Defense.

C.

Yes. After blocking access to a site, the user can manually switch on isolation.

D.

Yes. Isolate is a possible Action for URL Filtering.

Question 22

What is the primary function of the on-premises VM in the EDM process?

Options:

A.

To local analyze cloud transactions for potential PII exfiltration.

B.

To replicate sensitive data across all organizational servers.

C.

To automate the indexing process by creating hashes for structured data elements.

D.

To store sensitive data securely and prevent unauthorized data access.

Question 23

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS includes which of the following?

Options:

A.

Spyware Callback

B.

Anonymizers

C.

Cookie Stealing

D.

IRC Tunneling

Question 24

Which of the following is an open standard used to provide automatic updates of a user's group and department information?

A Import

B. LDAP Sync

C. SCIM

D. SAML

Options:

Question 25

A user has opened a support case to complain about poor user experience when trying to manage their AWS resources. How could a helpdesk administrator get a useful root cause analysis to help isolate the issue in the least amount of time?

Options:

A.

Check the Zscaler Trust page for any indications of cloud outages or incidents that would be causing a slowdown.

B.

Check the user's ZDX score for a period of low score for AWS and use Analyze Score to get the ZDX Y-Engine analysis.

C.

Do a Deep Trace on the user's traffic and check for excessive DNS resolution times and other slowdowns.

D.

Initiate a packet capture from Zscaler Client Connector and escalate the case to have the trace analyzed for root cause.

Question 26

Which of the following options will protect against Botnet activity using IPS and Yara type content analysis?

Options:

A.

Command and Control Traffic

B.

Ransomware

C.

Troians

D.

Adware/Spyware Protection

Question 27

What is the purpose of the Zscaler Client Connector providing the authentication token to the Zscaler Client Connector Portal after it is received from Zscaler Internet Access?

Options:

A.

To bypass multifactor authentication (MFA) during the enrollment process

B.

To immediately grant the user access to Zscaler Private Access resources

C.

To enable the portal to register the user’s device and pass the registration to Zscaler Internet Access

D.

To share the authentication token with the SAML IdP to validate the user session

Question 28

When configuring an inline Data Loss Prevention policy with content inspection, which of the following are used to detect data, allow or block transactions, and notify your organization's auditor when a user's transaction triggers a DLP rule?

Options:

A.

Hosted PAC Files

B.

Index Tool

C.

DLP engines

D.

VPN Credentials

Question 29

What method does Zscaler Identity Threat Detection and Response use to gather information about AD domains?

Options:

A.

Scanning network ports

B.

Running LDAP queries

C.

Analyzing firewall logs

D.

Packet sniffing

Question 30

What does a DLP Engine consist of?

Options:

A.

DLP Policies

B.

DLP Rules

C.

DLP Dictionaries

D.

DLP Identifiers

Question 31

Can Notifications, based on Alert Rules, be sent with methods other than email?

Options:

A.

Email is the only method for notifications as that is universally applicable and no other way of sending them makes sense.

B.

In addition to email, text messages can be sent directly to one cell phone to alert the CISO who is then coordinating the work on the incident.

C.

Leading ITSM systems can be connected to the Zero Trust Exchange using a NSS server, which will then connect to ITSM tools and forwards the alert.

D.

In addition to email, notifications, based on Alert Rules, can be shared with leading ITSM or UCAAS tools over Webhooks.

Question 32

What are the two types of Alert Rules that can be defined?

Options:

A.

ThreatLabZ pre-defined and customer defined

B.

Snort defined and 3rd party defined

C.

ThreatLabZ pre-defined and 3rd party defined

D.

Customer defined and 3rd party defined

Question 33

Layered defense throughout an organization security platform is valuable because of which of the following?

Options:

A.

Layered defense increases costs to attackers to operate.

B.

Layered defense from multiple vendor solutions easily share attacker data.

C.

Layered defense ensures attackers are prevented eventually.

D.

Layered defense with multiple endpoint agents protects from attackers.

Question 34

Which of the following is a feature of ITDR (Identity Threat Detection and Response)?

Options:

A.

Prevents Patient Zero Infections

B.

Reduces identity related risks

C.

Prevents connections to Embargoed Countries

D.

Blocks malicious traffic by dropping packets

Question 35

For a deployment using both ZIA and ZPA set of services, what is the best authentication solution?

Options:

A.

Use forms Authentication in ZPA and SAML in ZIA

B.

Use forms Authentication in ZIA and SAML in ZPA

C.

Configure Authentication using SAML on both ZIA and ZPA

D.

Use forms Authentication for both ZIA and ZPA

Question 36

Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?

Options:

A.

The Cloud Firewall includes Deep Packet Inspection, which detects protocol evasions and sends the traffic to the respective engines for inspection and handling.

B.

Zscaler Client Connector will prevent evasion on the endpoint in conjunction with the endpoint operating system’s firewall.

C.

As traffic usually is forwarded from an on-premise firewall, this firewall will handle any evasion and will make sure that the protocols are corrected.

D.

The Cloud Firewall includes an IPS engine, which will detect the evasion techniques and will just block the transactions as it is invalid.

Question 37

How would an administrator retrieve the access token to use the Zscaler One API?

Options:

A.

The administrator needs to send a POST request along with the required parameters to Zldentity"s token endpoint.

B.

The administrator needs to send a GET request along with the required parameters to Zldentity's token endpoint.

C.

The administrator needs to logon to the ZIA portal to generate the access token with Super Admin role.

D.

The administrator needs to logon to the ZIA portal to generate the access token with API Admin role.

Page: 1 / 13
Total 125 questions