Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

ZDTA Exam Dumps - Zscaler Digital Transformation Administrator

Go to page:
Question # 9

When are users granted conditional access to segmented private applications?

A.

After passing criteria checks related to authorization and security.

B.

Immediately upon connection request for best performance.

C.

After a short delay of a random number of seconds.

D.

After verifying the user password inside of private application.

Full Access
Question # 10

Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?

A.

The Cloud Firewall includes Deep Packet Inspection, which detects protocol evasions and sends the traffic to the respective engines for inspection and handling.

B.

Zscaler Client Connector will prevent evasion on the endpoint in conjunction with the endpoint operating system’s firewall.

C.

As traffic usually is forwarded from an on-premise firewall, this firewall will handle any evasion and will make sure that the protocols are corrected.

D.

The Cloud Firewall includes an IPS engine, which will detect the evasion techniques and will just block the transactions as it is invalid.

Full Access
Question # 11

When configuring Zscaler Private Access, what is the function of the Server Group?

A.

Maps FQDNs to IP Addresses

B.

Maps Applications to FQDNs

C.

Maps App Connector Groups to Application Segments

D.

Maps Applications to Application Groups

Full Access
Question # 12

In support of data privacy about TLS/SSL inspection, when you subscribe to ZIA, you enter into what kind of agreement?

A.

Zscaler Compliance Policy

B.

Zscaler Privacy Policy

C.

Acceptable Use Policy

D.

Zscaler Data Processing Agreement

Full Access
Question # 13

Can URL Filtering make use of Cloud Browser Isolation?

A.

No. Cloud Browser Isolation is a separate platform.

B.

No. Cloud Browser Isolation is only a feature of Advanced Threat Defense.

C.

Yes. After blocking access to a site, the user can manually switch on isolation.

D.

Yes. Isolate is a possible Action for URL Filtering.

Full Access
Question # 14

Which type of malware is specifically used to deliver other malware?

A.

RAT

B.

Maldocs

C.

Downloaders

D.

Exploitation tool

Full Access
Question # 15

What mechanism identifies the ZIA Service Edge node that the Zscaler Client Connector should connect to?

A.

The IP ranges included/excluded in the App Profile

B.

The PAC file used in the Forwarding Profile

C.

The PAC file used in the Application Profile

D.

The Machine Key used in the Application Profile

Full Access
Question # 16

Which of the following is a feature of ITDR (Identity Threat Detection and Response)?

A.

Prevents Patient Zero Infections

B.

Reduces identity related risks

C.

Prevents connections to Embargoed Countries

D.

Blocks malicious traffic by dropping packets

Full Access
Go to page:

Hot Exams