Zscaler ZDTA - Zscaler Digital Transformation Administrator Exam

Question #6 (Topic: Exam A)
How is the relationship between App Connector Groups and Server Groups created?
A. The relationship between App Connector Groups and Server Groups is established dynamically in the Zero Trust Exchange as users try to access Applications B. When a new Server Group is created it points to the App Connector Groups that provide visibility to this Server Group C. Both App Connector Groups and Server Groups are linked together via the Data Center element D. When you create a new App Connector Group you must select the list of Server Groups to which it provides visibility
Answer: B
Question #7 (Topic: Exam A)
How would an administrator retrieve the access token to use the Zscaler One API?
A. The administrator needs to send a POST request along with the required parameters to ZIdentity's token endpoint. B. The administrator needs to send a GET request along with the required parameters to ZIdentity's token endpoint. C. The administrator needs to logon to the ZIA portal to generate the access token with Super Admin role. D. The administrator needs to logon to the ZIA portal to generate the access token with API Admin role.
Answer: A
Question #8 (Topic: Exam A)
What transport mechanism will Zscaler Client Connector use to forward traffic to the Zero Trust Exchange when configured for Tunnel 2.0?
A. Zscaler Client Connector will encapsulate the user's traffic in GRE tunnels to the ZTE. B. Zscaler Client Connector will encapsulate the user's traffic in IPSec tunnels to the ZTE. C. Zscaler Client Connector will encapsulate the user's traffic in dTLS/TLS tunnels to the ZTE. D. Zscaler Client Connector will encapsulate the user's traffic in HTTP Connect tunnels to the ZTE.
Answer: C
Question #9 (Topic: Exam A)
Zscaler Data Protection supports custom dictionaries.
What actions can administrators take with these dictionaries to protect data in motion?
A. Define specific keywords, phrases, or patterns relevant to their organization's sensitive data policy. B. Define specific governance and regulations relevant to their organization's sensitive data policy. C. Define specific SaaS tenant relevant to their organization's sensitive data policy. D. Define specific file types relevant to their organization's sensitive data policy.
Answer: A
Question #10 (Topic: Exam A)
What enables zero trust to be properly implemented and enforced between an originator and the destination application?
A. Trusted network criteria designate the locations of originators which can be trusted. B. Access is granted without sharing the network between the originator and the destination application. C. Cloud firewall policies ensure that only authenticated users are allowed access to destination applications. D. Connectivity between the originator and the destination application is over IPSec tunnels.
Answer: B
Download Exam
Page: 2 / 29
Total 143 questions