Zscaler ZDTE - Zscaler Digital Transformation Engineer Exam

Question #6 (Topic: Exam A)
In a LDAP authentication flow, who requests the user credentials?
A. Active Directory B. SAML Identity Provider C. NSS Server D. Zscaler
Answer: D
Question #7 (Topic: Exam A)
A contractor is visiting an organization for a maintenance task. The administrator does not have a spare laptop to give them. How will the administrator secure access for the contractor?
A. Cloud Connector B. SD-WAN C. Privileged Remote Access D. Branch Connector
Answer: C
Question #8 (Topic: Exam A)
A security analyst is configuring Zscaler Data Loss Prevention (DLP) policies and wants to ensure that sensitive files are accurately identified and inspected. They ask about the methods Zscaler DLP uses to inspect files and detect potential data leaks. What are the three levels of inspection that Zscaler DLP employs to accurately identify and inspect files?
A. Magic Bytes, mime type, and file extension B. Magic Bytes, mime type, encryption status C. File header, file extension, and file signature D. File Header, file extension, and encryption status
Answer: A
Question #9 (Topic: Exam A)
How many rounds of analysis are performed on a sandboxed sample to determine its characteristics?
A. One static analysis, one dynamic analysis, and a second static analysis of all dropped files and artifacts from the dynamic analysis. B. As many rounds of analysis as the policy is confirmed to perform. C. Only one static and one dynamic analysis is performed. D. Only a static analysis is performed.
Answer: A
Question #10 (Topic: Exam A)
How does Zscaler apply Tenant Restriction policies to cloud applications?
A. By inserting headers with the appropriate information during authentication B. By allowing unrestricted access to all cloud applications C. By disabling cloud applications completely D. By blocking all external traffic
Answer: A
Download Exam
Page: 2 / 11
Total 52 questions