Pass the Zscaler Digital Transformation Administrator ZDTA Questions and answers with CertsForce

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

Within ZPA, the mapping relationship between Connector Groups and Server Groups can best be defined as which of the following?

Options:

A.

Server Groups are configured for Dynamic Server Discovery so that mapped Connector Groups can then DNS resolve individual application Segment Groups.


B.

Connector Groups are configured for Dynamic Server Discovery so that mapped Server Groups can DNS resolve and advertise the applications.


C.

Connector Groups are configured for Dynamic Server Discovery so that ZPA can steer traffic through the appropriate Server Group.


D.

Server Groups are configured for Dynamic Server Discovery so that mapped Connector Groups can DNS resolve and make health checks toward the application.


Expert Solution
Questions # 32:

Which Zscaler forwarding mechanism creates a loopback address on the machine to forward the traffic towards Zscaler cloud?

Options:

A.

Enforced PAC mode


B.

ZTunnel - Packet Filter Based


C.

ZTunnel with Local Proxy


D.

ZTunnel - Route Based


Expert Solution
Questions # 33:

If you're migrating from an on-premises proxy, you will already have a proxy setting configured within the browser or within the system. With Tunnel Mode, the best practice is to configure what type of proxy configuration?

Options:

A.

Execute a GPO update to retrieve the proxy settings from AD.


B.

Enforce no Proxy Configuration.


C.

Use Web Proxy Auto Discovery (WPAD) to auto-configure the proxy.


D.

Use an automatic configuration script (forwarding PAC file).


Expert Solution
Questions # 34:

SSH use or tunneling was detected and blocked by which feature?

Options:

A.

Cloud Agg Control


B.

URL Filtering


C.

Advanced Threat Protection

D Mobile Malware Protection


Expert Solution
Questions # 35:

What ports and protocols are forwarded to the Zero Trust Exchange when Zscaler Client Connector is using Tunnel 2.0?

Options:

A.

TCP ports 80, 443 and 8080 only.


B.

Any HTTP/HTTPS traffic as well as DNS.


C.

All TCP and UDP ports as well as ICMP traffic.


D.

All Web ports as well as FTP and SSH.


Expert Solution
Questions # 36:

When are users granted conditional access to segmented private applications?

Options:

A.

After passing criteria checks related to authorization and security.


B.

Immediately upon connection request for best performance.


C.

After a short delay of a random number of seconds.


D.

After verifying the user password inside of private application.


Expert Solution
Questions # 37:

Which are valid criteria for use in Access Policy Rules for ZPA?

Options:

A.

Group Membership, ZIA Risk Score, Domain Joined, Certificate Trust


B.

Username, Trusted Network Status, Password, Location


C.

SCIM Group, Time of Day, Client Type, Country Code


D.

Department, SNI, Branch Connector Group, Machine Group


Expert Solution
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions