Zscaler Digital Transformation Administrator ZDTA Exam Questions

Page: 1 / 14
Total 125 questions
Question 1

When configuring a ZDX custom application and choosing Type: 'Network' and completing the configuration by defining the necessary probe(s), which performance metrics will an administrator NOT get for users after enabling the application?



Answer : D

When a ZDX custom application is configured with the type set to 'Network', the administrator will not get Disk I/O metrics for users. Disk I/O metrics relate to local client device performance and are not part of network-type application probes which focus on network latency, server response, and other network-centric measurements.

The study guide notes that Disk I/O is part of endpoint-level monitoring and is not collected by network-type probes, unlike metrics such as Server Response Time or ZDX Score which are network related.


Question 2

What does the user risk score enable a user to do?



Answer : C

The user risk score enables organizations to configure stronger user-specific policies to monitor and control user-level risk exposure. This score reflects a user's risk posture based on behaviors and detected anomalies and helps in tailoring security policies to address individual risk levels.

While the score gives insight into user risk, it is primarily designed for adaptive policy enforcement rather than direct compromise detection or cross-company comparison. The study guide highlights that user risk scores drive policy adjustments to better secure user activity.


Question 3

What Malware Protection setting can be selected when setting up a Malware Policy?



Answer : C

The valid Malware Protection setting selectable when configuring a Malware Policy in Zscaler is Block. This setting instructs the platform to block malicious files or activities detected by malware scanning engines.

Other settings like Isolate or Bypass are not standard malware policy actions in Zscaler's malware protection configuration. The ''Do Not Decrypt'' option relates to SSL inspection settings, not malware policy actions. The study guide specifies ''Block'' as the primary malware policy action to enforce protection.


Question 4

What transport mechanism will Zscaler Client Connector use to forward traffic to the Zero Trust Exchange when configured for Tunnel 2.0?



Answer : C

Zscaler Client Connector's Tunnel 2.0 encapsulates user traffic in DTLS (or TLS) tunnels to the Zero Trust Exchange, providing both transport security and protocol flexibility before handing off to Zscaler's inspection and enforcement engines.


Question 5

What is the purpose of a Microtunnel (M-Tunnel) in Zscaler?



Answer : D

The Microtunnel (M-Tunnel) in Zscaler is designed to create an end-to-end communication channel to internal applications. This tunnel facilitates secure and direct access from the client device to internal corporate applications without exposing the network or requiring traditional VPN infrastructure. The M-Tunnel is part of ZPA's mechanism to ensure secure, zero-trust access to private resources.


Question 6

An administrator needs to SSL inspect all traffic but one specific URL category. The administrator decides to create two policies, one to inspect all traffic and another one to bypass the specific category. What is the logical sequence in which they have to appear in the list?



Answer : B

When creating SSL inspection policies, the exception policy for the specific URL category must appear first in the policy list, followed by the more generic 'inspect all' policy further down. Zscaler evaluates policies in order, so placing the exception first ensures that traffic matching that category bypasses inspection before the generic policy is applied.

The study guide emphasizes the importance of policy order to ensure correct application of exceptions and general rules.


Question 7

What is the purpose of the Zscaler Client Connector providing the authentication token to the Zscaler Client Connector Portal after it is received from Zscaler Internet Access?



Answer : C

The Zscaler Client Connector provides the authentication token to the Zscaler Client Connector Portal to enable the portal to register the user's device and pass the registration to Zscaler Internet Access. This registration process is crucial for device posture assessment and policy enforcement, ensuring that only registered and compliant devices receive appropriate access.


Page:    1 / 14   
Total 125 questions