Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Zscaler ZDTA Zscaler Digital Transformation Administrator Exam Practice Test

Page: 1 / 6
Total 60 questions

Zscaler Digital Transformation Administrator Questions and Answers

Question 1

How is data gathered with ZDX Advanced client performance?

Options:

A.

By generating synthetic transactions to designated Internet and Private applications every 5 minutes and measuring the performance of those sessions.

B.

By constantly analyzing live user sessions to both Internet and Private applications and measuring the performance of those sessions.

C.

By using AI predictive analysis ZDX can extrapolate near-term client performance based upon recent past data observed.

D.

By constantly analyzing live user sessions to critical SaaS applications and measuring the performance of those sessions.

Question 2

Which of the following is a common use case for adopting Zscaler’s Data Protection?

Options:

A.

Reduce your Internet Attack Surface

B.

Prevent download of Malicious Files

C.

Prevent loss to Internet and Cloud Apps

D.

Securely connect users to Private Applications

Question 3

An administrator wants to allow users to access a wide variety of untrusted URLs. Which of the following would allow users to access these URLs in a safe manner?

Options:

A.

Browser Isolation

B.

App Connector

C.

Zscaler Private Access

D.

Zscaler Client Connector

Question 4

When the Zscaler Client Connector launches, which portal does it initially interact with to understand the user's domain and identity provider (IdP)?

Options:

A.

Zscaler Private Access (ZPA) Portal

B.

Zscaler Central Authority

C.

Zscaler Internet Access (ZIA) Portal

D.

Zscaler Client Connector Portal

Question 5

Which Zscaler feature detects whether an intruder is accessing your internal resources?

Options:

A.

SandBox

B.

SSL Decryption Bypass

C.

Browser Isolation

D.

Deception

Question 6

Fundamental capabilities needed by other services within the Zscaler Zero Trust Exchange are provided by which of these?

Options:

A.

Access Control Services

B.

Digital Experience Monitoring

C.

Cyber Security Services

D.

Platform Services

Question 7

Zscaler Advanced Threat Protection (ATP) is a key capability within Zscaler Internet Access (ZIA), protecting users against attacks such as phishing. Which of the following is NOT part of the ATP workflow?

Options:

A.

IPS coverages for client-side and server-side

B.

Reporting high latency from the CEO's Teams call due to a low WiFi signal

C.

Comprehensive URL categories for newly registered domains

D.

Preventing the download of a password protected zip file

Question 8

Which of the following secures all IP unicast traffic?

Options:

A.

Secure Shell (SSH)

B.

Tunnel with local proxy

C.

Enforce PAC

D.

Z-Tunnel 2.0

Question 9

What is one of the four steps of a cyber attack?

Options:

A.

Find Cash Safe

B.

Find Email Addresses

C.

Find Least Secure Office Building

D.

Find Attack Surface

Question 10

What does Advanced Threat Protection defend users from?

Options:

A.

Vulnerable JavaScripts

B.

Large iFrames

C.

Malicious active content

D.

Command injection attacks

Question 11

Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?

Options:

A.

The Cloud Firewall includes Deep Packet Inspection, which detects protocol evasions and sends the traffic to the respective engines for inspection and handling.

B.

Zscaler Client Connector will prevent evasion on the endpoint in conjunction with the endpoint operating system’s firewall.

C.

As traffic usually is forwarded from an on-premise firewall, this firewall will handle any evasion and will make sure that the protocols are corrected.

D.

The Cloud Firewall includes an IPS engine, which will detect the evasion techniques and will just block the transactions as it is invalid.

Question 12

Which types of Botnet Protection are supplied by Advanced Threat Protection?

Options:

A.

Malicious file downloads, Command traffic (sending / receiving), Data exfiltration

B.

Connections to known C&C servers, Command traffic (sending / receiving), Unknown C&C using AI/ML

C.

Connections to known C&C servers, Detection of phishing sites, Access to spam sites

D.

Vulnerabilities in web server applications, Unknown C&C using AI/ML, Vulnerable ActiveX controls

Question 13

Which is an example of Inline Data Protection?

Options:

A.

Preventing the copying of a sensitive document to a USB drive.

B.

Preventing the sharing of a sensitive document in OneDrive.

C.

Analyzing a customer’s M365 tenant for security best practices.

D.

Blocking the attachment of a sensitive document in webmail.

Question 14

Which list of protocols is supported by Zscaler for Privileged Remote Access?

Options:

A.

RDP, VNC and SSH

B.

RDP, SSH and DHCP

C.

SSH, DNS and DHCP

D.

RDP, DNS and VNC

Question 15

How does Zscaler Risk360 quantify risk?

Options:

A.

The number of risk events is totaled by location and combined.

B.

A risk score is computed based on the number of remediations needed compared to the industry peer average.

C.

Time to mitigate each identified risk is totaled, averaged, and tracked to show ongoing trends.

D.

A risk score is computed for each of the four stages of breach.

Question 16

What is the immediate outcome or effect when the Zscaler Office 365 One Click Rule is enabled?

Options:

A.

All traffic undergoes mandatory SSL inspection.

B.

Office 365 traffic is exempted from SSL inspection and other web policies.

C.

Non-Office 365 traffic is blocked.

D.

All Office 365 drive traffic is blocked.

Question 17

When users are authenticated using SAML, what are the two most efficient ways of provisioning the users?

Options:

A.

Hosted User Database and Directory Server Synchronization

B.

SAML and Hosted User Database

C.

SCIM and Directory Server Synchronization

D.

SCIM and SAML Autoprovisioning

Question 18

Which attack type is characterized by a commonly used website or service that has malicious content like malicious JavaScript running on it?

Options:

A.

Watering Hole Attack

B.

Pre-existing Compromise

C.

Phishing Attack

D.

Exploit Kits

Page: 1 / 6
Total 60 questions