Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

ZDTA Exam Dumps - Zscaler Digital Transformation Administrator

Go to page:
Question # 4

What method does Zscaler Identity Threat Detection and Response use to gather information about AD domains?

A.

Scanning network ports

B.

Running LDAP queries

C.

Analyzing firewall logs

D.

Packet sniffing

Full Access
Question # 5

What ports and protocols are forwarded to the Zero Trust Exchange when Zscaler Client Connector is using Tunnel 2.0?

A.

TCP ports 80, 443 and 8080 only.

B.

Any HTTP/HTTPS traffic as well as DNS.

C.

All TCP and UDP ports as well as ICMP traffic.

D.

All Web ports as well as FTP and SSH.

Full Access
Question # 6

Which type of attack plants malware on commonly accessed services?

A.

Remote access trojans

B.

Phishing

C.

Exploit kits

D.

Watering hole attack

Full Access
Question # 7

What is the ZIA feature that ensures certain SaaS applications cannot be accessed from an unmanaged device?

A.

Tenant Restriction

B.

Identity Proxy

C.

Out-of-band Application Access

D.

SaaS Application Access

Full Access
Question # 8

The security exceptions allow list for Advanced Threat Protection apply to which of the following Policies?

A.

Sandbox

B.

URL Filtering

C.

File Type Control

D.

IPS Control

Full Access
Go to page: