Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

ZDTA Zscaler Digital Transformation Administrator Questions and Answers

Questions 4

Which of the following is a valid action for a SaaS Security API Data Loss Prevention Rule?

Options:

A.

Enable AI/ML based Smart Browser Isolation

B.

Quarantine Mai ware

C.

Create Zero Trust Network Decoy

D.

Remove External Collaborators and Sharable Link

Buy Now
Questions 5

Malware Protection inside HTTPS connections is performed using which parts of the Zero Trust Exchange?

Options:

A.

Deception creating decoy files for malware to discover.

B.

Application Segmentation of users to specific private applications.

C.

TLS Inspection decrypting traffic to compare signatures for known risks.

D.

Data Loss Protection comparing saved filenames for known risks.

Buy Now
Questions 6

What does TLS Inspection for Zscaler Internet Access secure public internet browsing with?

Options:

A.

Storing connection streams for future customer review.

B.

Removing certificates and reconnecting client connection using HTTP.

C.

Intermediate certificates are created for each client connection.

D.

Logging which clients receive the original webserver certificate.

Buy Now
Questions 7

Zscaler Platform Services works upon unencrypted data from encrypted communications due to which of the following?

Options:

A.

Antivirus

B.

Tenant Restrictions

C.

Web Filtering

D.

TLS Inspection

Buy Now
Questions 8

What are common delivery mechanisms for malware?

Options:

A.

Malware downloads from web pages

B.

Personal emails, company documents, OneDrive

C.

Spam, exploit kits, USB drives, video streaming

D.

Phishing, Exploit Kits, Watering Holes, Pre-existing Compromise

Buy Now
Questions 9

What is the default timer in ZDX Advanced for web probes to be sent?

Options:

A.

1 minute

B.

10 minutes

C.

30 minutes

D.

5 minutes

Buy Now
Questions 10

Which of the following options will protect against Botnet activity using IPS and Yara type content analysis?

Options:

A.

Command and Control Traffic

B.

Ransomware

C.

Troians

D.

Adware/Spyware Protection

Buy Now
Questions 11

Which of the following is a common use case for adopting Zscaler’s Data Protection?

Options:

A.

Reduce your Internet Attack Surface

B.

Prevent download of Malicious Files

C.

Prevent loss to Internet and Cloud Apps

D.

Securely connect users to Private Applications

Buy Now
Questions 12

Which Advanced Threat Protection feature restricts website access by geographic location?

Options:

A.

Spyware Callback

B.

Botnet Protection

C.

Blocked Countries

D.

Browser Exploits

Buy Now
Questions 13

Which of the following DLP components make use of Boolean Logic?

Options:

A.

DLP Rules

B.

DLP Dictionaries

C.

DLP Engines

D.

DLP Identifiers

Buy Now
Questions 14

What does Zscaler Advanced Firewall support that Zscaler Standard Firewall does not?

Options:

A.

Destination NAT

B.

FQDN Filtering with wildcard

C.

DNS Dashboards, Insights and Logs

D.

DNS Tunnel and DNS Application Control

Buy Now
Questions 15

Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?

Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?

Options:

A.

Six - one per data center plus two for cold standby.

B.

Eight -two per data center.

C.

Four - one per data center.

D.

Sixteen - to support a full mesh to the other data centers.

Buy Now
Questions 16

Zscaler forwards the server SSL/TLS certificate directly to the user's browser session in which situation?

Options:

A.

When traffic contains a known threat signature.

B.

When web traffic is on custom TCP ports.

C.

When traffic is exempted in SSL Inspection policy rules.

D.

When user has connected to server in the past.

Buy Now
Questions 17

Which type of attack plants malware on commonly accessed services?

Options:

A.

Remote access trojans

B.

Phishing

C.

Exploit kits

D.

Watering hole attack

Buy Now
Questions 18

When filtering user access to certain web destinations what can be a better option, URL or Cloud Application filtering Policies?

Options:

A.

Cloud Application policies provide better access control.

B.

URL filtering policies provide better access control.

C.

Wherever possible URL policies are recommended.

D.

Both provide the same filtering capabilities.

Buy Now
Questions 19

A user has opened a support case to complain about poor user experience when trying to manage their AWS resources. How could a helpdesk administrator get a useful root cause analysis to help isolate the issue in the least amount of time?

Options:

A.

Check the Zscaler Trust page for any indications of cloud outages or incidents that would be causing a slowdown.

B.

Check the user's ZDX score for a period of low score for AWS and use Analyze Score to get the ZDX Y-Engine analysis.

C.

Do a Deep Trace on the user's traffic and check for excessive DNS resolution times and other slowdowns.

D.

Initiate a packet capture from Zscaler Client Connector and escalate the case to have the trace analyzed for root cause.

Buy Now
Questions 20

What is the immediate outcome or effect when the Zscaler Office 365 One Click Rule is enabled?

Options:

A.

All traffic undergoes mandatory SSL inspection.

B.

Office 365 traffic is exempted from SSL inspection and other web policies.

C.

Non-Office 365 traffic is blocked.

D.

All Office 365 drive traffic is blocked.

Buy Now
Questions 21

Which list of protocols is supported by Zscaler for Privileged Remote Access?

Options:

A.

RDP, VNC and SSH

B.

RDP, SSH and DHCP

C.

SSH, DNS and DHCP

D.

RDP, DNS and VNC

Buy Now
Questions 22

Does the Access Control suite include features that prevent lateral movement?

Options:

A.

No. Access Control Services will only control access to the Internet and cloud applications.

B.

Yes. Controls for segmentation and conditional access are part of the Access Control Services.

C.

Yes. The Cloud Firewall will detect network segments and provide conditional access.

D.

No. The endpoint firewall will detect network segments and steer access.

Buy Now
Questions 23

What is the default policy configuration setting for checking for Viruses?

Options:

A.

Allow

B.

Block

C.

Unwanted Applications

D.

Malware Protection

Buy Now
Questions 24

When are users granted conditional access to segmented private applications?

Options:

A.

After passing criteria checks related to authorization and security.

B.

Immediately upon connection request for best performance.

C.

After a short delay of a random number of seconds.

D.

After verifying the user password inside of private application.

Buy Now
Questions 25

Which SaaS platform is supported by Zscaler's SaaS Security Posture Management (SSPM)?

Options:

A.

Amazon S3

B.

Webex Teams

C.

Dropbox

D.

Google Workspace

Buy Now
Questions 26

What is the name of the feature that allows the platform to apply URL filtering even when a Cloud APP control policy explicitly permits a transaction?

Options:

A.

Allow Cascading

B.

Allow and Quarantine

C.

Allow URL Filtering

D.

Allow and Scan

Buy Now
Questions 27

What is the scale used to represent a users Zscaler Digital Experience (ZDX) score?

Options:

A.

1-100

B.

1-10

C.

1 - 1000

D.

0 - 50

Buy Now
Questions 28

For a deployment using both ZIA and ZPA set of services, what is the best authentication solution?

Options:

A.

Use forms Authentication in ZPA and SAML in ZIA

B.

Use forms Authentication in ZIA and SAML in ZPA

C.

Configure Authentication using SAML on both ZIA and ZPA

D.

Use forms Authentication for both ZIA and ZPA

Buy Now
Questions 29

When a SAML IDP returns an assertion containing device attributes, which Zscaler component consumes the attributes first, for policy creation?

Options:

A.

Enforcement node

B.

Zscaler SAML SP

C.

Mobile Admin Portal

D.

Zero Trust Exchange

Buy Now
Questions 30

Can Notifications, based on Alert Rules, be sent with methods other than email?

Options:

A.

Email is the only method for notifications as that is universally applicable and no other way of sending them makes sense.

B.

In addition to email, text messages can be sent directly to one cell phone to alert the CISO who is then coordinating the work on the incident.

C.

Leading ITSM systems can be connected to the Zero Trust Exchange using a NSS server, which will then connect to ITSM tools and forwards the alert.

D.

In addition to email, notifications, based on Alert Rules, can be shared with leading ITSM or UCAAS tools over Webhooks.

Buy Now
Questions 31

Which of the following are types of device posture?

Options:

A.

Detect Crowdstrike, Crowdstrike ZTA score, First name

B.

Certificate Trust, File Path, Full Disk Encryption

C.

Domain Joined, Process Check, Deception Check

D.

Unauthorized Modification, OS Version, License Key

Buy Now
Questions 32

Which of the following statements most accurately describes Zero Trust Connections?

Options:

A.

They require that SSH inspection be enabled.

B.

They are dependent on a fixed / static network environment.

C.

They are independent of any network for control or trust.

D.

They require IPV6.

Buy Now
Questions 33

The security exceptions allow list for Advanced Threat Protection apply to which of the following Policies?

Options:

A.

Sandbox

B.

URL Filtering

C.

File Type Control

D.

IPS Control

Buy Now
Questions 34

If you're migrating from an on-premises proxy, you will already have a proxy setting configured within the browser or within the system. With Tunnel Mode, the best practice is to configure what type of proxy configuration?

Options:

A.

Execute a GPO update to retrieve the proxy settings from AD.

B.

Enforce no Proxy Configuration.

C.

Use Web Proxy Auto Discovery (WPAD) to auto-configure the proxy.

D.

Use an automatic configuration script (forwarding PAC file).

Buy Now
Questions 35

What are the two types of Alert Rules that can be defined?

Options:

A.

ThreatLabZ pre-defined and customer defined

B.

Snort defined and 3rd party defined

C.

ThreatLabZ pre-defined and 3rd party defined

D.

Customer defined and 3rd party defined

Buy Now
Questions 36

The Forwarding Profile defines which of the following?

Options:

A.

Fallback methods and behavior when a DTLS tunnel cannot be established

B.

Application PAC file location

C.

System PAC file when off trusted network

D.

Fallback methods and behavior when a TLS tunnel cannot be established

Buy Now
Questions 37

Which of the following connects Zscaler users to the nearest Microsoft 365 servers for a better experience?

Options:

A.

Single DNS resolver with forwarders providing centralized results

B.

Private MPLS in each branch office providing connection

C.

Multiple distributed DNS resolvers providing local results

D.

Optimized TCP Scaling for maximum throughput of files

Buy Now
Exam Code: ZDTA
Exam Name: Zscaler Digital Transformation Administrator
Last Update: Sep 14, 2025
Questions: 125
ZDTA pdf

ZDTA PDF

$25.5  $84.99
ZDTA Engine

ZDTA Testing Engine

$30  $99.99
ZDTA PDF + Engine

ZDTA PDF + Testing Engine

$40.5  $134.99