Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Zscaler ZDTA - Zscaler Digital Transformation Administrator

Page: 2 / 4
Total 125 questions

What is a ZIA Sublocation?

A.

The section of a corporate Location used to separate traffic, like traffic from employees from guest traffic

B.

The section of a corporate Location that sends traffic to a Subcloud

C.

Every one of the sections in a Corporate Location that use overlapping IP addresses

D.

A way to separate generic traffic from that coming from Client Connector

If you're migrating from an on-premises proxy, you will already have a proxy setting configured within the browser or within the system. With Tunnel Mode, the best practice is to configure what type of proxy configuration?

A.

Execute a GPO update to retrieve the proxy settings from AD.

B.

Enforce no Proxy Configuration.

C.

Use Web Proxy Auto Discovery (WPAD) to auto-configure the proxy.

D.

Use an automatic configuration script (forwarding PAC file).

When the Zscaler Client Connector launches, which portal does it initially interact with to understand the user's domain and identity provider (IdP)?

A.

Zscaler Private Access (ZPA) Portal

B.

Zscaler Central Authority

C.

Zscaler Internet Access (ZIA) Portal

D.

Zscaler Client Connector Portal

What are common delivery mechanisms for malware?

A.

Malware downloads from web pages

B.

Personal emails, company documents, OneDrive

C.

Spam, exploit kits, USB drives, video streaming

D.

Phishing, Exploit Kits, Watering Holes, Pre-existing Compromise

When are users granted conditional access to segmented private applications?

A.

After passing criteria checks related to authorization and security.

B.

Immediately upon connection request for best performance.

C.

After a short delay of a random number of seconds.

D.

After verifying the user password inside of private application.

You've configured the API connection to automatically download Microsoft Information Protection (MIP) labels into ZIA; where will you use these imported labels to protect sensitive data in motion?

A.

Creating a custom DLP Dictionary

B.

Creating a SaaS Security Posture Control Policy.

C.

Creating a File Type Control Policy.

D.

Creating a custom DLP Policy.

Zscaler Data Protection supports custom dictionaries.

What actions can administrators take with these dictionaries to protect data in motion?

A.

Define specific keywords, phrases, or patterns relevant to their organization's sensitive data policy.

B.

Define specific governance and regulations relevant to their organization's sensitive data policy.

C.

Define specific SaaS tenant relevant to their organization's sensitive data policy

D.

Define specific file types relevant to their organization's sensitive data policy.

SSH use or tunneling was detected and blocked by which feature?

A.

Cloud Agg Control

B.

URL Filtering

C.

Advanced Threat Protection

D Mobile Malware Protection

Which Advanced Threats policy can be configured to protect users against a credential attack?

A.

Configure Advanced Cloud Sandbox policies.

B.

Block Suspected phishing sites.

C.

Enable Watering Hole detection.

D.

Block Windows executable files from uncategorized websites.

Which feature does Zscaler Client Connector Z-Tunnel 2.0 enable over Z-Tunnel 1.0?

A.

Enables SSL Inspection for Client Connector

B.

Inspection of all ports and protocols via Cloud Firewall

C.

Enables Browser Isolation

D.

Enables multicast traffic