Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

ZDTA Exam Dumps - Zscaler Digital Transformation Administrator

Go to page:
Question # 17

Which Risk360 key focus area observes a broad range of event, security configurations, and traffic flow attributes?

A.

External Attack Surface

B.

Prevent Compromise

C.

Data Loss

D.

Lateral Propagation

Full Access
Question # 18

What is the main purpose of Sandbox functionality?

A.

Block malware that we have previously identified

B.

Build a test environment where we can evaluate the result of policies

C.

Identify Zero-Day Threats

D.

Balance thread detection across customers around the world

Full Access
Question # 19

Within ZPA, the mapping relationship between Connector Groups and Server Groups can best be defined as which of the following?

A.

Server Groups are configured for Dynamic Server Discovery so that mapped Connector Groups can then DNS resolve individual application Segment Groups.

B.

Connector Groups are configured for Dynamic Server Discovery so that mapped Server Groups can DNS resolve and advertise the applications.

C.

Connector Groups are configured for Dynamic Server Discovery so that ZPA can steer traffic through the appropriate Server Group.

D.

Server Groups are configured for Dynamic Server Discovery so that mapped Connector Groups can DNS resolve and make health checks toward the application.

Full Access
Question # 20

What is the default policy configuration setting for checking for Viruses?

A.

Allow

B.

Block

C.

Unwanted Applications

D.

Malware Protection

Full Access
Question # 21

Which Advanced Threat Protection feature restricts website access by geographic location?

A.

Spyware Callback

B.

Botnet Protection

C.

Blocked Countries

D.

Browser Exploits

Full Access
Question # 22

What does the user risk score enable a user to do?

A.

Compare the user risk score with other companies to evaluate users vs other companies.

B.

Determine whether or not a user is authorized to view unencrypted data.

C.

Configure stronger user-specific policies to monitor & control user-level risk exposure.

D.

Determine if a user has been compromised

Full Access
Question # 23

Which of the following scenarios would generate a “Patient 0” alert?

A.

Zscaler's AI/ML based Smart Browser Isolation was triggered due to a users accessing a newly-registered domain.

B.

A new malicious file was detected by the sandbox due to an “allow and scan” First-Time Action in the sandbox policy.

C.

A new malicious file was detected by the sandbox due to an “quarantine” First-Time Action in the sandbox policy.

D.

Zscaler detected a HIPAA violation with in-band Data Protection scanning.

Full Access
Question # 24

What does Advanced Threat Protection defend users from?

A.

Vulnerable JavaScripts

B.

Large iFrames

C.

Malicious active content

D.

Command injection attacks

Full Access
Go to page:

Hot Exams