Pass the Zscaler Digital Transformation Administrator ZDTA Questions and answers with CertsForce

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

What can Zscaler Client Connector evaluate that provides the most thorough determination of the trust level of a device as criteria for an access policy enabling remote access to sensitive private applications?

Options:

A.

Client Type


B.

SCIM User Attributes


C.

Trusted Network


D.

Posture Profiles


Expert Solution
Questions # 22:

When configuring Zscaler Private Access, what is the function of the Server Group?

Options:

A.

Maps FQDNs to IP Addresses


B.

Maps Applications to FQDNs


C.

Maps App Connector Groups to Application Segments


D.

Maps Applications to Application Groups


Expert Solution
Questions # 23:

When configuring a ZDX custom application and choosing Type: 'Network' and completing the configuration by defining the necessary probe(s), which performance metrics will an administrator NOT get for users after enabling the application?

Options:

A.

Server Response Time


B.

ZDX Score


C.

Client Gateway IP Address


D.

Disk I/O


Expert Solution
Questions # 24:

Which of the following is a feature of ITDR (Identity Threat Detection and Response)?

Options:

A.

Prevents Patient Zero Infections


B.

Reduces identity related risks


C.

Prevents connections to Embargoed Countries


D.

Blocks malicious traffic by dropping packets


Expert Solution
Questions # 25:

According to the Zero Trust Exchange Functional Services Diagram, which services does Antivirus belong to?

Options:

A.

Platform Services


B.

Access Control Services


C.

Security Services


D.

Advanced Threat Prevention Services


Expert Solution
Questions # 26:

What is the main purpose of Sandbox functionality?

Options:

A.

Block malware that we have previously identified


B.

Build a test environment where we can evaluate the result of policies


C.

Identify Zero-Day Threats


D.

Balance thread detection across customers around the world


Expert Solution
Questions # 27:

Does the Access Control suite include features that prevent lateral movement?

Options:

A.

No. Access Control Services will only control access to the Internet and cloud applications.


B.

Yes. Controls for segmentation and conditional access are part of the Access Control Services.


C.

Yes. The Cloud Firewall will detect network segments and provide conditional access.


D.

No. The endpoint firewall will detect network segments and steer access.


Expert Solution
Questions # 28:

What is the ZIA feature that ensures certain SaaS applications cannot be accessed from an unmanaged device?

Options:

A.

Tenant Restriction


B.

Identity Proxy


C.

Out-of-band Application Access


D.

SaaS Application Access


Expert Solution
Questions # 29:

In support of data privacy about TLS/SSL inspection, when you subscribe to ZIA, you enter into what kind of agreement?

Options:

A.

Zscaler Compliance Policy


B.

Zscaler Privacy Policy


C.

Acceptable Use Policy


D.

Zscaler Data Processing Agreement


Expert Solution
Questions # 30:

When users are authenticated using SAML, what are the two most efficient ways of provisioning the users?

Options:

A.

Hosted User Database and Directory Server Synchronization


B.

SAML and Hosted User Database


C.

SCIM and Directory Server Synchronization


D.

SCIM and SAML Autoprovisioning


Expert Solution
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions