Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

ZDTA Questions and Answers

Question # 6

What is the purpose of the Zscaler Client Connector providing the authentication token to the Zscaler Client Connector Portal after it is received from Zscaler Internet Access?

A.

To bypass multifactor authentication (MFA) during the enrollment process

B.

To immediately grant the user access to Zscaler Private Access resources

C.

To enable the portal to register the user’s device and pass the registration to Zscaler Internet Access

D.

To share the authentication token with the SAML IdP to validate the user session

Full Access
Question # 7

Which filtering policy blocked access to the Network Application?

A.

Sandbox

B.

Browser Control

C.

Firewall Filtering

D.

DLP

Full Access
Question # 8

What is Zscaler's rotation policy for intermediate certificate authority certificates?

A.

Certificates are rotated every 90 days and have a 180-day expiration.

B.

Lifetime certificates have no expiration date.

C.

Certificates are rotated every seven days and have a 14-day expiration.

D.

Certificates are issued dynamically and expire in 24 hours.

Full Access
Question # 9

Layered defense throughout an organization security platform is valuable because of which of the following?

A.

Layered defense increases costs to attackers to operate.

B.

Layered defense from multiple vendor solutions easily share attacker data.

C.

Layered defense ensures attackers are prevented eventually.

D.

Layered defense with multiple endpoint agents protects from attackers.

Full Access
Question # 10

Is SCIM required for ZIA?

A.

Depends

B.

Maybe

C.

No

D.

Yes

Full Access
Question # 11

Zscaler Advanced Threat Protection (ATP) is a key capability within Zscaler Internet Access (ZIA), protecting users against attacks such as phishing. Which of the following is NOT part of the ATP workflow?

A.

IPS coverages for client-side and server-side

B.

Reporting high latency from the CEO's Teams call due to a low WiFi signal

C.

Comprehensive URL categories for newly registered domains

D.

Preventing the download of a password protected zip file

Full Access
Question # 12

What is one business risk introduced by the use of legacy firewalls?

A.

Performance issues

B.

Reduced management

C.

Low costs

D.

Low licensing support

Full Access
Question # 13

The Security Alerts section of the Alerts dashboard has a graph showing what information?

A.

Top 5 Malware Programs Detected

B.

Top 5 Viruses by Region

C.

Top 5 Threats by Systems Impacted

D.

Top 5 Unified Threat Yara Options

Full Access
Question # 14

Can Notifications, based on Alert Rules, be sent with methods other than email?

A.

Email is the only method for notifications as that is universally applicable and no other way of sending them makes sense.

B.

In addition to email, text messages can be sent directly to one cell phone to alert the CISO who is then coordinating the work on the incident.

C.

Leading ITSM systems can be connected to the Zero Trust Exchange using a NSS server, which will then connect to ITSM tools and forwards the alert.

D.

In addition to email, notifications, based on Alert Rules, can be shared with leading ITSM or UCAAS tools over Webhooks.

Full Access
Question # 15

As technology that exists for a very long period of time, has URL Filtering lost its effectiveness?

A.

URL Filter is the most commonly used web filtering technique in the arsenal. It acts as first line of defense.

B.

In a modern cloud world, access to all Internet sites and cloud applications should be granted by default. URL Filtering is no longer needed.

C.

URL Filtering has been replaced by CASB functionality through blocking access to all Internet sites and only allowing a few corporate applications.

D.

URL Filtering is outdated and no longer needed. The rise of HTTPS leads renders URL Filtering ineffective as all traffic is encrypted.

Full Access
Question # 16

What does the user risk score enable a user to do?

A.

Compare the user risk score with other companies to evaluate users vs other companies.

B.

Determine whether or not a user is authorized to view unencrypted data.

C.

Configure stronger user-specific policies to monitor & control user-level risk exposure.

D.

Determine if a user has been compromised

Full Access
Question # 17

While troubleshooting a user's slow application access, can a ZDX administrator see degradations in Wi-Fi signal strength?

A.

Yes, the Wi-Fi hop latency is shown on a cloud path probe.

B.

Yes. but the current Wi-Fi signal strength is only displayed when doing a deep trace.

C.

No, ZDX only works on hardwired devices.

D.

Yes, a low Wi-Fi signal may be seen in either the results of a Cloud Path Probe or in the device health Wi-Fi signal indicator.

Full Access
Question # 18

When configuring a ZDX custom application and choosing Type: 'Network' and completing the configuration by defining the necessary probe(s), which performance metrics will an administrator NOT get for users after enabling the application?

A.

Server Response Time

B.

ZDX Score

C.

Client Gateway IP Address

D.

Disk I/O

Full Access
Question # 19

What are the two types of Probe supported in ZDX?

A.

Web Probes and Cloud Path Probes

B.

Application Probes and Network Probes

C.

Page Speed Probes and Connection Speed Probes

D.

SSaas Probes and Router Probes

Full Access
Question # 20

Which of the following secures all IP unicast traffic?

A.

Secure Shell (SSH)

B.

Tunnel with local proxy

C.

Enforce PAC

D.

Z-Tunnel 2.0

Full Access
Question # 21

What is the ZIA feature that ensures certain SaaS applications cannot be accessed from an unmanaged device?

A.

Tenant Restriction

B.

Identity Proxy

C.

Out-of-band Application Access

D.

SaaS Application Access

Full Access
Question # 22

Which feature does Zscaler Client Connector Z-Tunnel 2.0 enable over Z-Tunnel 1.0?

A.

Enables SSL Inspection for Client Connector

B.

Inspection of all ports and protocols via Cloud Firewall

C.

Enables Browser Isolation

D.

Enables multicast traffic

Full Access
Question # 23

Which of the following options will protect against Botnet activity using IPS and Yara type content analysis?

A.

Command and Control Traffic

B.

Ransomware

C.

Troians

D.

Adware/Spyware Protection

Full Access
Question # 24

Which of the following methods can be used to notify an end-user of a potential DLP violation in Zscaler’s Workflow Automation solution?

A.

Notifications in MS Teams / Slack

B.

SMS text message.

C.

Automated phone call.

D Twitter post with custom hashtan

Full Access
Question # 25

Which attack type is characterized by a commonly used website or service that has malicious content like malicious JavaScript running on it?

A.

Watering Hole Attack

B.

Pre-existing Compromise

C.

Phishing Attack

D.

Exploit Kits

Full Access
Question # 26

Which of the following connects Zscaler users to the nearest Microsoft 365 servers for a better experience?

A.

Single DNS resolver with forwarders providing centralized results

B.

Private MPLS in each branch office providing connection

C.

Multiple distributed DNS resolvers providing local results

D.

Optimized TCP Scaling for maximum throughput of files

Full Access
Question # 27

An administrator would like users to be able to use the corporate instance of a SaaS application. Which of the following allows an administrator to make that distinction?

A.

Out-of-band CASB

B.

Cloud application control

C.

URL filtering with SSL inspection

D.

Endpoint DLP

Full Access
Question # 28

Zscaler Data Protection supports custom dictionaries.

What actions can administrators take with these dictionaries to protect data in motion?

A.

Define specific keywords, phrases, or patterns relevant to their organization's sensitive data policy.

B.

Define specific governance and regulations relevant to their organization's sensitive data policy.

C.

Define specific SaaS tenant relevant to their organization's sensitive data policy

D.

Define specific file types relevant to their organization's sensitive data policy.

Full Access
Question # 29

Which type of malware is specifically used to deliver other malware?

A.

RAT

B.

Maldocs

C.

Downloaders

D.

Exploitation tool

Full Access
Question # 30

How does a Zscaler administrator troubleshoot a certificate pinned application?

A.

They could look at SSL logs for a failed client handshake.

B.

They could reboot the endpoint device.

C.

They could inspect the ZIA Web Policy.

D.

They could look into the SaaS application analytics tab.

Full Access
Question # 31

Zscaler Client Connector checks for software updates automatically at which interval?

A.

Every 6 hours

B.

Every 12 hours

C.

Every 2 hours

D.

Every 24 hours

Full Access
Question # 32

What does an Endpoint refer to in an API architecture?

A.

An end-user device like a laptop or an OT/IoT device

B.

A URL providing access to a specific resource

C.

Zscaler public service edges

D.

Zscaler API gateway providing access to various components

Full Access
Question # 33

From a user perspective, Zscaler Bandwidth Control performs traffic shaping and buffering on what direction(s) of traffic?

A.

Outbound traffic is shaped. Inbound or localhost traffic is unshaped.

B.

Outbound or inbound traffic is shaped. Localhost traffic is unshaped.

C.

Inbound traffic is shaped. Outbound or localhost traffic is unshaped.

D.

Localhost traffic is shaped. Outbound or Inbound traffic is unshaped.

Full Access
Question # 34

What is the preferred method for authentication to access oneAPI?

A.

OpenID Connect (OIDC)

B.

Transport Layer Security (TLS)

C.

Security Assertion Markup Language (SAML)

D.

System for Cross-domain Identity Management (SCIM)

Full Access
Question # 35

Within ZPA, the mapping relationship between Connector Groups and Server Groups can best be defined as which of the following?

A.

Server Groups are configured for Dynamic Server Discovery so that mapped Connector Groups can then DNS resolve individual application Segment Groups.

B.

Connector Groups are configured for Dynamic Server Discovery so that mapped Server Groups can DNS resolve and advertise the applications.

C.

Connector Groups are configured for Dynamic Server Discovery so that ZPA can steer traffic through the appropriate Server Group.

D.

Server Groups are configured for Dynamic Server Discovery so that mapped Connector Groups can DNS resolve and make health checks toward the application.

Full Access
Question # 36

A user has opened a support case to complain about poor user experience when trying to manage their AWS resources. How could a helpdesk administrator get a useful root cause analysis to help isolate the issue in the least amount of time?

A.

Check the Zscaler Trust page for any indications of cloud outages or incidents that would be causing a slowdown.

B.

Check the user's ZDX score for a period of low score for AWS and use Analyze Score to get the ZDX Y-Engine analysis.

C.

Do a Deep Trace on the user's traffic and check for excessive DNS resolution times and other slowdowns.

D.

Initiate a packet capture from Zscaler Client Connector and escalate the case to have the trace analyzed for root cause.

Full Access
Question # 37

What is the name of the feature that allows the platform to apply URL filtering even when a Cloud APP control policy explicitly permits a transaction?

A.

Allow Cascading

B.

Allow and Quarantine

C.

Allow URL Filtering

D.

Allow and Scan

Full Access