Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Zscaler ZDTA - Zscaler Digital Transformation Administrator

Page: 3 / 4
Total 125 questions

What are the two types of Alert Rules that can be defined?

A.

ThreatLabZ pre-defined and customer defined

B.

Snort defined and 3rd party defined

C.

ThreatLabZ pre-defined and 3rd party defined

D.

Customer defined and 3rd party defined

In which of the following SaaS apps can you protect data at rest via Zscaler's out-of-band CASB solution?

A.

Yahoo Mail

B.

Twitter.

C.

Google Drive.

D.

Facebook.

Which of the following are types of device posture?

A.

Detect Crowdstrike, Crowdstrike ZTA score, First name

B.

Certificate Trust, File Path, Full Disk Encryption

C.

Domain Joined, Process Check, Deception Check

D.

Unauthorized Modification, OS Version, License Key

Which types of Botnet Protection are supplied by Advanced Threat Protection?

A.

Malicious file downloads, Command traffic (sending / receiving), Data exfiltration

B.

Connections to known C&C servers, Command traffic (sending / receiving), Unknown C&C using AI/ML

C.

Connections to known C&C servers, Detection of phishing sites, Access to spam sites

D.

Vulnerabilities in web server applications, Unknown C&C using AI/ML, Vulnerable ActiveX controls

A user has opened a support case to complain about poor user experience when trying to manage their AWS resources. How could a helpdesk administrator get a useful root cause analysis to help isolate the issue in the least amount of time?

A.

Check the Zscaler Trust page for any indications of cloud outages or incidents that would be causing a slowdown.

B.

Check the user's ZDX score for a period of low score for AWS and use Analyze Score to get the ZDX Y-Engine analysis.

C.

Do a Deep Trace on the user's traffic and check for excessive DNS resolution times and other slowdowns.

D.

Initiate a packet capture from Zscaler Client Connector and escalate the case to have the trace analyzed for root cause.

Client Connector forwarding profile determines how we want to forward the traffic to the Zscaler Cloud. Assuming we have configured tunnels (GRE or IPSEC) from locations, what is the recommended combination for on-trusted and off-trusted options?

A.

Tunnel v2.0 for on-trusted and tunnel v2.0 for off-trusted

B.

None for on-trusted and none for off-trusted

C.

None for on-trusted and tunnel v2.0 for off-trusted

D.

Tunnel v2.0 for on-trusted and none for off-trusted

Which Advanced Threat Protection feature restricts website access by geographic location?

A.

Spyware Callback

B.

Botnet Protection

C.

Blocked Countries

D.

Browser Exploits

What happens after the Zscaler Client Connector receives a valid SAML response from the Identity Provider (IdP)?

A.

The Zscaler Client Connector Portal authenticates the user directly.

B.

There is no need for further actions as the SAML is valid, access is granted immediately.

C.

The SAML response is sent back to the user’s device for local validation.

D.

Zscaler Internet Access validates the SAML response and returns an authentication token.

Which Risk360 key focus area observes a broad range of event, security configurations, and traffic flow attributes?

A.

External Attack Surface

B.

Prevent Compromise

C.

Data Loss

D.

Lateral Propagation

Which of the following components is installed on an endpoint to connect users to the Zero Trust Exchange regardless of their location - home, work, while traveling, etc.?

A.

Client connector

B.

Private Service Edge

C.

IPSec/GRE Tunnel

D.

App Connector