Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Zscaler > Digital Transformation Administrator > ZDTA

ZDTA Zscaler Digital Transformation Administrator Question and Answers

Question # 4

When users are authenticated using SAML, what are the two most efficient ways of provisioning the users?

A.

Hosted User Database and Directory Server Synchronization

B.

SAML and Hosted User Database

C.

SCIM and Directory Server Synchronization

D.

SCIM and SAML Autoprovisioning

Full Access
Question # 5

What does an Endpoint refer to in an API architecture?

A.

An end-user device like a laptop or an OT/IoT device

B.

A URL providing access to a specific resource

C.

Zscaler public service edges

D.

Zscaler API gateway providing access to various components

Full Access
Question # 6

How does a Zscaler administrator troubleshoot a certificate pinned application?

A.

They could look at SSL logs for a failed client handshake.

B.

They could reboot the endpoint device.

C.

They could inspect the ZIA Web Policy.

D.

They could look into the SaaS application analytics tab.

Full Access
Question # 7

An organization has more than one ZIA instance, each on different clouds. The organization is using the same login domain for both and upon login users are given this menu in ZCC asking which cloud they would like to join. What steps could an Administrator take to avoid having this menu appear?

A.

Customize an MSI version of the ZCC file specifying the USERDOMAIN variable.

B.

Customize an MSI version of the ZCC file specifying the CLOUDNAME variable.

C.

Federate the login domain between two different IDP instances.

D.

Create only one SAML integration with the desired ZIA instance.

Full Access
Question # 8

Which of the following is unrelated to the properties of 'Trusted Networks'?

A.

DNS Server

B.

Default Gateway

C.

Org ID

D.

Network Range

Full Access
Question # 9

Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?

A.

The Cloud Firewall includes Deep Packet Inspection, which detects protocol evasions and sends the traffic to the respective engines for inspection and handling.

B.

Zscaler Client Connector will prevent evasion on the endpoint in conjunction with the endpoint operating system’s firewall.

C.

As traffic usually is forwarded from an on-premise firewall, this firewall will handle any evasion and will make sure that the protocols are corrected.

D.

The Cloud Firewall includes an IPS engine, which will detect the evasion techniques and will just block the transactions as it is invalid.

Full Access
Question # 10

Which list of protocols is supported by Zscaler for Privileged Remote Access?

A.

RDP, VNC and SSH

B.

RDP, SSH and DHCP

C.

SSH, DNS and DHCP

D.

RDP, DNS and VNC

Full Access
Question # 11

What Malware Protection setting can be selected when setting up a Malware Policy?

A.

Isolate

B.

Bypass

C.

Block

D.

Do Not Decrypt

Full Access
Question # 12

What is the primary function of the on-premises VM in the EDM process?

A.

To local analyze cloud transactions for potential PII exfiltration.

B.

To replicate sensitive data across all organizational servers.

C.

To automate the indexing process by creating hashes for structured data elements.

D.

To store sensitive data securely and prevent unauthorized data access.

Full Access
Question # 13

What method does Zscaler Identity Threat Detection and Response use to gather information about AD domains?

A.

Scanning network ports

B.

Running LDAP queries

C.

Analyzing firewall logs

D.

Packet sniffing

Full Access
Question # 14

What is the purpose of a Microtunnel (M-Tunnel) in Zscaler?

A.

To provide an end-to-end communication channel between ZCC clients

B.

To provide an end-to-end communication channel to Microsoft Applications such as M365

C.

To create an end-to-end communication channel to Azure AD for authentication

D.

To create an end-to-end communication channel to internal applications

Full Access
Question # 15

An administrator needs to SSL inspect all traffic but one specific URL category. The administrator decides to create two policies, one to inspect all traffic and another one to bypass the specific category. What is the logical sequence in which they have to appear in the list?

A.

Both policies are incompatible, so it is not possible to have them together.

B.

First the policy for the exception Category, then further down the list the policy for the generic "inspect all."

C.

First the policy for the generic "inspect all", then further down the list the policy for the exception Category.

D.

All policies both generic and specific will be evaluated so no specific order is required.

Full Access
Question # 16

According to the Zero Trust Exchange Functional Services Diagram, which services does Antivirus belong to?

A.

Platform Services

B.

Access Control Services

C.

Security Services

D.

Advanced Threat Prevention Services

Full Access
Question # 17

Which Zscaler feature detects whether an intruder is accessing your internal resources?

A.

SandBox

B.

SSL Decryption Bypass

C.

Browser Isolation

D.

Deception

Full Access
Question # 18

What does a DLP Engine consist of?

A.

DLP Policies

B.

DLP Rules

C.

DLP Dictionaries

D.

DLP Identifiers

Full Access