Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Zscaler ZDTA - Zscaler Digital Transformation Administrator

Page: 1 / 4
Total 125 questions

What does TLS Inspection for Zscaler Internet Access secure public internet browsing with?

A.

Storing connection streams for future customer review.

B.

Removing certificates and reconnecting client connection using HTTP.

C.

Intermediate certificates are created for each client connection.

D.

Logging which clients receive the original webserver certificate.

What is one business risk introduced by the use of legacy firewalls?

A.

Performance issues

B.

Reduced management

C.

Low costs

D.

Low licensing support

Which of the following is unrelated to the properties of 'Trusted Networks'?

A.

DNS Server

B.

Default Gateway

C.

Org ID

D.

Network Range

When filtering user access to certain web destinations what can be a better option, URL or Cloud Application filtering Policies?

A.

Cloud Application policies provide better access control.

B.

URL filtering policies provide better access control.

C.

Wherever possible URL policies are recommended.

D.

Both provide the same filtering capabilities.

What can Zscaler Client Connector evaluate that provides the most thorough determination of the trust level of a device as criteria for an access policy enabling remote access to sensitive private applications?

A.

Client Type

B.

SCIM User Attributes

C.

Trusted Network

D.

Posture Profiles

Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?

Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?

A.

Six - one per data center plus two for cold standby.

B.

Eight -two per data center.

C.

Four - one per data center.

D.

Sixteen - to support a full mesh to the other data centers.

For a deployment using both ZIA and ZPA set of services, what is the best authentication solution?

A.

Use forms Authentication in ZPA and SAML in ZIA

B.

Use forms Authentication in ZIA and SAML in ZPA

C.

Configure Authentication using SAML on both ZIA and ZPA

D.

Use forms Authentication for both ZIA and ZPA

Which of the following are correct request methods when configuring a URL filtering rule with a Caution action?

A.

Connect, Get, Head

B.

Options, Delete, Put

C.

Get, Delete, Trace

D.

Connect, Post, Put

What is the main purpose of Sandbox functionality?

A.

Block malware that we have previously identified

B.

Build a test environment where we can evaluate the result of policies

C.

Identify Zero-Day Threats

D.

Balance thread detection across customers around the world

How does Zscaler Risk360 quantify risk?

A.

The number of risk events is totaled by location and combined.

B.

A risk score is computed based on the number of remediations needed compared to the industry peer average.

C.

Time to mitigate each identified risk is totaled, averaged, and tracked to show ongoing trends.

D.

A risk score is computed for each of the four stages of breach.