Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

ZDTA Questions and Answers

Question # 6

What does TLS Inspection for Zscaler Internet Access secure public internet browsing with?

A.

Storing connection streams for future customer review.

B.

Removing certificates and reconnecting client connection using HTTP.

C.

Intermediate certificates are created for each client connection.

D.

Logging which clients receive the original webserver certificate.

Full Access
Question # 7

What is the ZIA feature that ensures certain SaaS applications cannot be accessed from an unmanaged device?

A.

Tenant Restriction

B.

Identity Proxy

C.

Out-of-band Application Access

D.

SaaS Application Access

Full Access
Question # 8

What is the recommended minimum number of App connectors needed to ensure resiliency?

A.

2

B.

6

C.

4

D.

3

Full Access
Question # 9

What Malware Protection setting can be selected when setting up a Malware Policy?

A.

Isolate

B.

Bypass

C.

Block

D.

Do Not Decrypt

Full Access
Question # 10

According to the Zero Trust Exchange Functional Services Diagram, which services does Antivirus belong to?

A.

Platform Services

B.

Access Control Services

C.

Security Services

D.

Advanced Threat Prevention Services

Full Access
Question # 11

Which list of protocols is supported by Zscaler for Privileged Remote Access?

A.

RDP, VNC and SSH

B.

RDP, SSH and DHCP

C.

SSH, DNS and DHCP

D.

RDP, DNS and VNC

Full Access
Question # 12

What does Advanced Threat Protection defend users from?

A.

Vulnerable JavaScripts

B.

Large iFrames

C.

Malicious active content

D.

Command injection attacks

Full Access
Question # 13

Which type of attack plants malware on commonly accessed services?

A.

Remote access trojans

B.

Phishing

C.

Exploit kits

D.

Watering hole attack

Full Access
Question # 14

What does Zscaler Advanced Firewall support that Zscaler Standard Firewall does not?

A.

Destination NAT

B.

FQDN Filtering with wildcard

C.

DNS Dashboards, Insights and Logs

D.

DNS Tunnel and DNS Application Control

Full Access
Question # 15

What does the user risk score enable a user to do?

A.

Compare the user risk score with other companies to evaluate users vs other companies.

B.

Determine whether or not a user is authorized to view unencrypted data.

C.

Configure stronger user-specific policies to monitor & control user-level risk exposure.

D.

Determine if a user has been compromised

Full Access
Question # 16

Which attack type is characterized by a commonly used website or service that has malicious content like malicious JavaScript running on it?

A.

Watering Hole Attack

B.

Pre-existing Compromise

C.

Phishing Attack

D.

Exploit Kits

Full Access
Question # 17

How does a Zscaler administrator troubleshoot a certificate pinned application?

A.

They could look at SSL logs for a failed client handshake.

B.

They could reboot the endpoint device.

C.

They could inspect the ZIA Web Policy.

D.

They could look into the SaaS application analytics tab.

Full Access
Question # 18

Which proprietary technology does Zscaler use to calculate risk attributes dynamically for websites?

A.

Third-Party Sandbox

B.

Zscaler PageRisk

C.

Browser Isolation Feedback Form

D.

Deception Controller

Full Access