New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Zscaler ZDTE - Zscaler Digital Transformation Engineer

Page: 1 / 2
Total 60 questions

Which type of sensitive information can be protected using OCR (Optical Character Recognition) technology?

A.

Personally Identifiable Information (PII)

B.

Network configurations

C.

Software licenses

D.

Financial transactions

An organization needs to comply with regulatory requirements that mandate web traffic inspected by ZIA to be processed within a specific geographic region. How can Zscaler help achieve this compliance?

A.

By allowing traffic to bypass ZIA Public Service Edges and connect directly to the destination

B.

By creating a subcloud that includes only ZIA Public Service Edges within the required region

C.

By deploying local VPNs to ensure regional traffic compliance

D.

By dynamically allocating traffic to the closest Public Service Edge, regardless of the region

What are common use cases of Zscaler OneAPI automation?

A.

Enrolling users’ device information and installing antivirus features in Zscaler Client Connector (ZCC).

B.

Creating App Connector Groups and enrolling users’ device information.

C.

Creating URL filtering rules and accessing ZDX Copilot.

D.

Creating App Connector Groups and accessing ZDX Copilot.

At which level of the Zscaler Architecture do the Zscaler APIs sit?

A.

Enforcement Plane

B.

Nanolog Cluster

C.

Central Authority

D.

Data Fabric

Which of the following capabilities is not included in the OneAPI Framework for ZIA?

A.

Administrator Role Based Access

B.

Web Insights Log Retrieval

C.

SCIM Enable/Disable

D.

Malware Settings

Which set of protocols was developed to provide the most secure passwordless authentication methods, using services such as Windows Hello and YubiKey?

A.

SCIM

B.

OpenID

C.

Fast Identity Online 2 (FIDO2)

D.

SAML

What is Zscaler's peering policy?

A.

Zscaler refuses new peering requests and is happy with the current connectivity.

B.

Zscaler has a restricted peering policy (Zscaler will peer with a limited list of providers).

C.

Zscaler has an open peering policy (Zscaler will peer with any content or service provider).

D.

Zscaler has no defined policy and will evaluate requests individually.

How many rounds of analysis are performed on a sandboxed sample to determine its characteristics?

A.

One static analysis, one dynamic analysis, and a second static analysis of all dropped files and artifacts from the dynamic analysis.

B.

As many rounds of analysis as the policy is configured to perform.

C.

Only a static analysis is performed.

D.

Only one static and one dynamic analysis is performed.

When using a Domain Joined posture element to allow access in a ZPA Access Policy, which statement is true?

A.

Only some Linux operating systems have Domain Joined posture profile support in Zscaler.

B.

When a ZPA Browser Access client attempts to access an application, Zscaler can determine if that device is joined to a particular domain.

C.

If a 2nd domain and a sub-domain are needed in the Access Policy rule you must create a 2nd posture profile with the other domain and add it to the Access Policy.

D.

Zscaler ZPA can contact the IDP such as Azure AD out-of-band to verify if a device is joined to a particular domain.

Why is it important that the IP address of ZPA App Connectors is included in an Active Directory Sites and Services configuration?

A.

Adding the IP address of ZPA App Connectors to an AD Sites and Services configuration helps with accommodating BGP routing designs.

B.

So admins can access Domain Controllers by IP address.

C.

So users can authenticate to ZPA with Active Directory.

D.

Ensures users connect to the closest Domain Controllers or SCCM servers.