ZDTA Zscaler Digital Transformation Administrator Questions and Answers
When creating an installer package or using the command-line for installation, which Zscaler Client Connector installer options are used to automatically redirect to your corporate SAML IdP on launch?
Which of the following statements accurately reflects Zscaler's file size limitation for Malware Protection scans?
Which of the following connects Zscaler users to the nearest Microsoft 365 servers for a better experience?
Malware Protection inside HTTPS connections is performed using which parts of the Zero Trust Exchange?
Which of the following options will protect against Botnet activity using IPS and Yara type content analysis?
What is the recommended default rule for the cloud-gen firewall configuration when deploying a new ZIA tenant?
Which three levels of inspection are used by Zscaler for File Type Identification?
What does TLS Inspection for Zscaler Internet Access secure public internet browsing with?
You recently deployed an additional App Connector to an existing app connector group. What do you need to do before starting the zpa-connector service?
When configuring a ZDX custom application and choosing Type: 'Network' and completing the configuration by defining the necessary probe(s), which performance metrics will an administrator NOT get for users after enabling the application?
When a SAML IDP returns an assertion containing device attributes, which Zscaler component consumes the attributes first, for policy creation?
Which Zscaler feature detects whether an intruder is accessing your internal resources?
How would an administrator retrieve the access token to use the Zscaler One API?
Which Platform Service enables visibility into the headers and payload of encrypted transactions?
As technology that exists for a very long period of time, has URL Filtering lost its effectiveness?
How does Zscaler ensure that sensitive structured data used in the EDM process is not stored in its cloud environment?
What Malware Protection setting can be selected when setting up a Malware Policy?
What is the purpose of the Zscaler Client Connector providing the authentication token to the Zscaler Client Connector Portal after it is received from Zscaler Internet Access?
How does a Zscaler administrator troubleshoot a certificate pinned application?
From a user perspective, Zscaler Bandwidth Control performs traffic shaping and buffering on what direction(s) of traffic?
What mechanism identifies the ZIA Service Edge node that the Zscaler Client Connector should connect to?
An administrator would like users to be able to use the corporate instance of a SaaS application. Which of the following allows an administrator to make that distinction?
Which SaaS platform is supported by Zscaler's SaaS Security Posture Management (SSPM)?
What is Zscaler's rotation policy for intermediate certificate authority certificates?
Which of the following methods can be used to notify an end-user of a potential DLP violation in Zscaler’s Workflow Automation solution?
Which feature does Zscaler Client Connector Z-Tunnel 2.0 enable over Z-Tunnel 1.0?
Which Advanced Threat Protection feature restricts website access by geographic location?
Which of the following is a common use case for adopting Zscaler’s Data Protection?
Which of the following is a unified management console for internet and SaaS applications, private applications, digital experience monitoring and endpoint agents?
Which field within a URL filtering rule must be defined for Browser Isolation to work?