New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Zscaler Digital Transformation Engineer ZDTE Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

When using a Domain Joined posture element to allow access in a ZPA Access Policy, which statement is true?

Options:

A.

Only some Linux operating systems have Domain Joined posture profile support in Zscaler.


B.

When a ZPA Browser Access client attempts to access an application, Zscaler can determine if that device is joined to a particular domain.


C.

If a 2nd domain and a sub-domain are needed in the Access Policy rule you must create a 2nd posture profile with the other domain and add it to the Access Policy.


D.

Zscaler ZPA can contact the IDP such as Azure AD out-of-band to verify if a device is joined to a particular domain.


Expert Solution
Questions # 12:

How many key engines does the Zscaler Firewall Module have?

Options:

A.

Three


B.

Two


C.

Five


D.

Four


Expert Solution
Questions # 13:

In an LDAP authentication flow, who requests the user credentials?

Options:

A.

NSS Server


B.

SAML Identity Provider


C.

Active Directory


D.

Zscaler


Expert Solution
Questions # 14:

An IT administrator is reviewing the recently configured ZDX module in their environment and checks the performance data on the dashboard. The administrator notices that no software inventory has populated. What could be a probable reason?

Options:

A.

ZDX client is not configured to collect inventory data


B.

ZDX license doesn't have inventory collection entitlement


C.

Zscaler Client Connector needs to be whitelisted on the EDR tool


D.

ZDX client version being used is 4.3


Expert Solution
Questions # 15:

Customers would like to use a PAC file to forward web traffic to a Subcloud. Which one below uses the correct variables for the required PAC file?

Options:

A.

{GATEWAY..}


B.

{.REGION.}


C.

{REGION..}


D.

{.GATEWAY.}


Expert Solution
Questions # 16:

What type of data would be protected by using Zscaler Indexed Document Matching (IDM)?

Options:

A.

Excel sheets and other numerically based document types that usually contain proprietary financial calculations.


B.

Sensitive data found in image files such as JPEGs and PNGs, or images embedded in documents like a Word file.


C.

Specific, sensitive pieces of data such as customer credit card numbers and employee national identity numbers.


D.

High-value documents that tend to carry sensitive data, such as medical forms and tax documents.


Expert Solution
Questions # 17:

An organization wants to upload internal PII (personally identifiable information) into the Zscaler cloud for blocking without fear of compromise. Which of the following technologies can be used to help with this?

Options:

A.

Dictionaries


B.

Engines


C.

IDM


D.

EDM


Expert Solution
Questions # 18:

When making API calls into a Zscaler environment, which component is the administrator communicating with?

Options:

A.

Logging Plane


B.

Control Plane


C.

Integration Plane


D.

Enforcement Plane


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions