Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

ZDTA Zscaler Digital Transformation Administrator Questions and Answers

Questions 4

What is one of the four steps of a cyber attack?

Options:

A.

Find Cash Safe

B.

Find Email Addresses

C.

Find Least Secure Office Building

D.

Find Attack Surface

Buy Now
Questions 5

Does the Access Control suite include features that prevent lateral movement?

Options:

A.

No. Access Control Services will only control access to the Internet and cloud applications.

B.

Yes. Controls for segmentation and conditional access are part of the Access Control Services.

C.

Yes. The Cloud Firewall will detect network segments and provide conditional access.

D.

No. The endpoint firewall will detect network segments and steer access.

Buy Now
Questions 6

When filtering user access to certain web destinations what can be a better option, URL or Cloud Application filtering Policies?

Options:

A.

Cloud Application policies provide better access control.

B.

URL filtering policies provide better access control.

C.

Wherever possible URL policies are recommended.

D.

Both provide the same filtering capabilities.

Buy Now
Questions 7

Does the Cloud Firewall detect evasion techniques that would allow applications to communicate over non-standard ports to bypass its controls?

Options:

A.

The Cloud Firewall includes Deep Packet Inspection, which detects protocol evasions and sends the traffic to the respective engines for inspection and handling.

B.

Zscaler Client Connector will prevent evasion on the endpoint in conjunction with the endpoint operating system’s firewall.

C.

As traffic usually is forwarded from an on-premise firewall, this firewall will handle any evasion and will make sure that the protocols are corrected.

D.

The Cloud Firewall includes an IPS engine, which will detect the evasion techniques and will just block the transactions as it is invalid.

Buy Now
Questions 8

An administrator would like users to be able to use the corporate instance of a SaaS application. Which of the following allows an administrator to make that distinction?

Options:

A.

Out-of-band CASB

B.

Cloud application control

C.

URL filtering with SSL inspection

D.

Endpoint DLP

Buy Now
Questions 9

When users are authenticated using SAML, what are the two most efficient ways of provisioning the users?

Options:

A.

Hosted User Database and Directory Server Synchronization

B.

SAML and Hosted User Database

C.

SCIM and Directory Server Synchronization

D.

SCIM and SAML Autoprovisioning

Buy Now
Questions 10

What enables zero trust to be properly implemented and enforced between an originator and the destination application?

Options:

A.

Trusted network criteria designate the locations of originators which can be trusted.

B.

Access is granted without sharing the network between the originator and the destination application.

C.

Cloud firewall policies ensure that only authenticated users are allowed access to destination applications.

D.

Connectivity between the originator and the destination application is over IPSec tunnels.

Buy Now
Questions 11

Which types of Botnet Protection are supplied by Advanced Threat Protection?

Options:

A.

Malicious file downloads, Command traffic (sending / receiving), Data exfiltration

B.

Connections to known C&C servers, Command traffic (sending / receiving), Unknown C&C using AI/ML

C.

Connections to known C&C servers, Detection of phishing sites, Access to spam sites

D.

Vulnerabilities in web server applications, Unknown C&C using AI/ML, Vulnerable ActiveX controls

Buy Now
Questions 12

Which Zscaler forwarding mechanism creates a loopback address on the machine to forward the traffic towards Zscaler cloud?

Options:

A.

Enforced PAC mode

B.

ZTunnel - Packet Filter Based

C.

ZTunnel with Local Proxy

D.

ZTunnel - Route Based

Buy Now
Questions 13

When a SAML IDP returns an assertion containing device attributes, which Zscaler component consumes the attributes first, for policy creation?

Options:

A.

Enforcement node

B.

Zscaler SAML SP

C.

Mobile Admin Portal

D.

Zero Trust Exchange

Buy Now
Questions 14

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS includes which of the following?

Options:

A.

Spyware Callback

B.

Anonymizers

C.

Cookie Stealing

D.

IRC Tunneling

Buy Now
Questions 15

Which of the following components is installed on an endpoint to connect users to the Zero Trust Exchange regardless of their location - home, work, while traveling, etc.?

Options:

A.

Client connector

B.

Private Service Edge

C.

IPSec/GRE Tunnel

D.

App Connector

Buy Now
Questions 16

You've configured the API connection to automatically download Microsoft Information Protection (MIP) labels into ZIA; where will you use these imported labels to protect sensitive data in motion?

Options:

A.

Creating a custom DLP Dictionary

B.

Creating a SaaS Security Posture Control Policy.

C.

Creating a File Type Control Policy.

D.

Creating a custom DLP Policy.

Buy Now
Questions 17

Which of the following DLP Notification methods can be used to forward a copy of the data that triggered the DLP policy to the auditor?

Options:

A.

Email Notification Template

B.

NSS Log Forwarding to SIEM

C.

SMS Text Message via PagerDuty

D.

Zscaler Client Connector pop-up message

Buy Now
Questions 18

Which of the following options will protect against Botnet activity using IPS and Yara type content analysis?

Options:

A.

Command and Control Traffic

B.

Ransomware

C.

Troians

D.

Adware/Spyware Protection

Buy Now
Questions 19

What method does Zscaler Identity Threat Detection and Response use to gather information about AD domains?

Options:

A.

Scanning network ports

B.

Running LDAP queries

C.

Analyzing firewall logs

D.

Packet sniffing

Buy Now
Questions 20

Which of the following are correct request methods when configuring a URL filtering rule with a Caution action?

Options:

A.

Connect, Get, Head

B.

Options, Delete, Put

C.

Get, Delete, Trace

D.

Connect, Post, Put

Buy Now
Questions 21

Which Advanced Threat Protection feature restricts website access by geographic location?

Options:

A.

Spyware Callback

B.

Botnet Protection

C.

Blocked Countries

D.

Browser Exploits

Buy Now
Questions 22

An administrator needs to SSL inspect all traffic but one specific URL category. The administrator decides to create two policies, one to inspect all traffic and another one to bypass the specific category. What is the logical sequence in which they have to appear in the list?

Options:

A.

Both policies are incompatible, so it is not possible to have them together.

B.

First the policy for the exception Category, then further down the list the policy for the generic "inspect all."

C.

First the policy for the generic "inspect all", then further down the list the policy for the exception Category.

D.

All policies both generic and specific will be evaluated so no specific order is required.

Buy Now
Questions 23

Which proprietary technology does Zscaler use to calculate risk attributes dynamically for websites?

Options:

A.

Third-Party Sandbox

B.

Zscaler PageRisk

C.

Browser Isolation Feedback Form

D.

Deception Controller

Buy Now
Questions 24

What does an Endpoint refer to in an API architecture?

Options:

A.

An end-user device like a laptop or an OT/IoT device

B.

A URL providing access to a specific resource

C.

Zscaler public service edges

D.

Zscaler API gateway providing access to various components

Buy Now
Questions 25

Within ZPA, the mapping relationship between Connector Groups and Server Groups can best be defined as which of the following?

Options:

A.

Server Groups are configured for Dynamic Server Discovery so that mapped Connector Groups can then DNS resolve individual application Segment Groups.

B.

Connector Groups are configured for Dynamic Server Discovery so that mapped Server Groups can DNS resolve and advertise the applications.

C.

Connector Groups are configured for Dynamic Server Discovery so that ZPA can steer traffic through the appropriate Server Group.

D.

Server Groups are configured for Dynamic Server Discovery so that mapped Connector Groups can DNS resolve and make health checks toward the application.

Buy Now
Questions 26

What does a DLP Engine consist of?

Options:

A.

DLP Policies

B.

DLP Rules

C.

DLP Dictionaries

D.

DLP Identifiers

Buy Now
Questions 27

As technology that exists for a very long period of time, has URL Filtering lost its effectiveness?

Options:

A.

URL Filter is the most commonly used web filtering technique in the arsenal. It acts as first line of defense.

B.

In a modern cloud world, access to all Internet sites and cloud applications should be granted by default. URL Filtering is no longer needed.

C.

URL Filtering has been replaced by CASB functionality through blocking access to all Internet sites and only allowing a few corporate applications.

D.

URL Filtering is outdated and no longer needed. The rise of HTTPS leads renders URL Filtering ineffective as all traffic is encrypted.

Buy Now
Questions 28

The Security Alerts section of the Alerts dashboard has a graph showing what information?

Options:

A.

Top 5 Malware Programs Detected

B.

Top 5 Viruses by Region

C.

Top 5 Threats by Systems Impacted

D.

Top 5 Unified Threat Yara Options

Buy Now
Questions 29

Is SCIM required for ZIA?

Options:

A.

Depends

B.

Maybe

C.

No

D.

Yes

Buy Now
Questions 30

During the authentication process while accessing a private web application, how is the SAML assertion delivered to the service provider?

Options:

A.

HTTP Redirect on the browser

B.

API request/response sequence

C.

Through the client connector

D.

Form POST via the browser

Buy Now
Questions 31

What Malware Protection setting can be selected when setting up a Malware Policy?

Options:

A.

Isolate

B.

Bypass

C.

Block

D.

Do Not Decrypt

Buy Now
Questions 32

Which Platform Service enables visibility into the headers and payload of encrypted transactions?

Options:

A.

Policy Framework

B.

TLS Decryption

C.

Reporting and Logging

D.

Device Posture

Buy Now
Questions 33

Which of the following is a valid action for a SaaS Security API Data Loss Prevention Rule?

Options:

A.

Enable AI/ML based Smart Browser Isolation

B.

Quarantine Mai ware

C.

Create Zero Trust Network Decoy

D.

Remove External Collaborators and Sharable Link

Buy Now
Questions 34

What is the recommended minimum number of App connectors needed to ensure resiliency?

Options:

A.

2

B.

6

C.

4

D.

3

Buy Now
Questions 35

Which of the following is a feature of ITDR (Identity Threat Detection and Response)?

Options:

A.

Prevents Patient Zero Infections

B.

Reduces identity related risks

C.

Prevents connections to Embargoed Countries

D.

Blocks malicious traffic by dropping packets

Buy Now
Questions 36

How would an administrator retrieve the access token to use the Zscaler One API?

Options:

A.

The administrator needs to send a POST request along with the required parameters to Zldentity"s token endpoint.

B.

The administrator needs to send a GET request along with the required parameters to Zldentity's token endpoint.

C.

The administrator needs to logon to the ZIA portal to generate the access token with Super Admin role.

D.

The administrator needs to logon to the ZIA portal to generate the access token with API Admin role.

Buy Now
Questions 37

SSH use or tunneling was detected and blocked by which feature?

Options:

A.

Cloud Agg Control

B.

URL Filtering

C.

Advanced Threat Protection

D Mobile Malware Protection

Buy Now
Exam Code: ZDTA
Exam Name: Zscaler Digital Transformation Administrator
Last Update: Aug 17, 2025
Questions: 125
ZDTA pdf

ZDTA PDF

$29.75  $84.99
ZDTA Engine

ZDTA Testing Engine

$35  $99.99
ZDTA PDF + Engine

ZDTA PDF + Testing Engine

$47.25  $134.99