Zscaler ZDTA - Zscaler Digital Transformation Administrator
What is a ZIA Sublocation?
If you're migrating from an on-premises proxy, you will already have a proxy setting configured within the browser or within the system. With Tunnel Mode, the best practice is to configure what type of proxy configuration?
When the Zscaler Client Connector launches, which portal does it initially interact with to understand the user's domain and identity provider (IdP)?
What are common delivery mechanisms for malware?
When are users granted conditional access to segmented private applications?
You've configured the API connection to automatically download Microsoft Information Protection (MIP) labels into ZIA; where will you use these imported labels to protect sensitive data in motion?
Zscaler Data Protection supports custom dictionaries.
What actions can administrators take with these dictionaries to protect data in motion?
SSH use or tunneling was detected and blocked by which feature?
Which Advanced Threats policy can be configured to protect users against a credential attack?
Which feature does Zscaler Client Connector Z-Tunnel 2.0 enable over Z-Tunnel 1.0?