Pass the Zscaler Digital Transformation Administrator ZDTA Questions and answers with CertsForce

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

What is a ZIA Sublocation?

Options:

A.

The section of a corporate Location used to separate traffic, like traffic from employees from guest traffic


B.

The section of a corporate Location that sends traffic to a Subcloud


C.

Every one of the sections in a Corporate Location that use overlapping IP addresses


D.

A way to separate generic traffic from that coming from Client Connector


Expert Solution
Questions # 12:

The Forwarding Profile defines which of the following?

Options:

A.

Fallback methods and behavior when a DTLS tunnel cannot be established


B.

Application PAC file location


C.

System PAC file when off trusted network


D.

Fallback methods and behavior when a TLS tunnel cannot be established


Expert Solution
Questions # 13:

How is the relationship between App Connector Groups and Server Groups created?

Options:

A.

The relationship between Agp_ Connector Groups and Server Groups is established dynamically in the Zero Trust Exchange as users try to access Applications


B.

When a new Server Group is created it points to the Agp_ Connector Groups that provide visibility to this Server Group


C.

Both Agg Connector Groups and Server Groups are linked together via the Data Center element


D.

When you create a new Agg Connector Group you must select the list of Server Groups to which it provides visibility


Expert Solution
Questions # 14:

Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?

Options:

A.

The Cloud Firewall includes Deep Packet Inspection, which detects protocol evasions and sends the traffic to the respective engines for inspection and handling.


B.

Zscaler Client Connector will prevent evasion on the endpoint in conjunction with the endpoint operating system’s firewall.


C.

As traffic usually is forwarded from an on-premise firewall, this firewall will handle any evasion and will make sure that the protocols are corrected.


D.

The Cloud Firewall includes an IPS engine, which will detect the evasion techniques and will just block the transactions as it is invalid.


Expert Solution
Questions # 15:

What Malware Protection setting can be selected when setting up a Malware Policy?

Options:

A.

Isolate


B.

Bypass


C.

Block


D.

Do Not Decrypt


Expert Solution
Questions # 16:

Can Notifications, based on Alert Rules, be sent with methods other than email?

Options:

A.

Email is the only method for notifications as that is universally applicable and no other way of sending them makes sense.


B.

In addition to email, text messages can be sent directly to one cell phone to alert the CISO who is then coordinating the work on the incident.


C.

Leading ITSM systems can be connected to the Zero Trust Exchange using a NSS server, which will then connect to ITSM tools and forwards the alert.


D.

In addition to email, notifications, based on Alert Rules, can be shared with leading ITSM or UCAAS tools over Webhooks.


Expert Solution
Questions # 17:

What is the scale used to represent a users Zscaler Digital Experience (ZDX) score?

Options:

A.

1-100


B.

1-10


C.

1 - 1000


D.

0 - 50


Expert Solution
Questions # 18:

What enables zero trust to be properly implemented and enforced between an originator and the destination application?

Options:

A.

Trusted network criteria designate the locations of originators which can be trusted.


B.

Access is granted without sharing the network between the originator and the destination application.


C.

Cloud firewall policies ensure that only authenticated users are allowed access to destination applications.


D.

Connectivity between the originator and the destination application is over IPSec tunnels.


Expert Solution
Questions # 19:

When the Zscaler Client Connector launches, which portal does it initially interact with to understand the user's domain and identity provider (IdP)?

Options:

A.

Zscaler Private Access (ZPA) Portal


B.

Zscaler Central Authority


C.

Zscaler Internet Access (ZIA) Portal


D.

Zscaler Client Connector Portal


Expert Solution
Questions # 20:

For a deployment using both ZIA and ZPA set of services, what is the best authentication solution?

Options:

A.

Use forms Authentication in ZPA and SAML in ZIA


B.

Use forms Authentication in ZIA and SAML in ZPA


C.

Configure Authentication using SAML on both ZIA and ZPA


D.

Use forms Authentication for both ZIA and ZPA


Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions