Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Zscaler ZDTA Practice Exam with Questions & Answers | Set: 2

Questions 11

Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?

Assume that you have four data centers around the globe, each hosting multiple applications for your users. What is the minimum number of App Connectors you should deploy?

Options:
A.

Six - one per data center plus two for cold standby.

B.

Eight -two per data center.

C.

Four - one per data center.

D.

Sixteen - to support a full mesh to the other data centers.

Zscaler ZDTA Premium Access
Questions 12

How is the relationship between App Connector Groups and Server Groups created?

Options:
A.

The relationship between Agp_ Connector Groups and Server Groups is established dynamically in the Zero Trust Exchange as users try to access Applications

B.

When a new Server Group is created it points to the Agp_ Connector Groups that provide visibility to this Server Group

C.

Both Agg Connector Groups and Server Groups are linked together via the Data Center element

D.

When you create a new Agg Connector Group you must select the list of Server Groups to which it provides visibility

Questions 13

An administrator wants to allow users to access a wide variety of untrusted URLs. Which of the following would allow users to access these URLs in a safe manner?

Options:
A.

Browser Isolation

B.

App Connector

C.

Zscaler Private Access

D.

Zscaler Client Connector

Questions 14

Does the Access Control suite include features that prevent lateral movement?

Options:
A.

No. Access Control Services will only control access to the Internet and cloud applications.

B.

Yes. Controls for segmentation and conditional access are part of the Access Control Services.

C.

Yes. The Cloud Firewall will detect network segments and provide conditional access.

D.

No. The endpoint firewall will detect network segments and steer access.

Questions 15

Zscaler Platform Services works upon unencrypted data from encrypted communications due to which of the following?

Options:
A.

Antivirus

B.

Tenant Restrictions

C.

Web Filtering

D.

TLS Inspection

Questions 16

When configuring a ZDX custom application and choosing Type: 'Network' and completing the configuration by defining the necessary probe(s), which performance metrics will an administrator NOT get for users after enabling the application?

Options:
A.

Server Response Time

B.

ZDX Score

C.

Client Gateway IP Address

D.

Disk I/O

Questions 17

What does the user risk score enable a user to do?

Options:
A.

Compare the user risk score with other companies to evaluate users vs other companies.

B.

Determine whether or not a user is authorized to view unencrypted data.

C.

Configure stronger user-specific policies to monitor & control user-level risk exposure.

D.

Determine if a user has been compromised

Questions 18

A user has opened a support case to complain about poor user experience when trying to manage their AWS resources. How could a helpdesk administrator get a useful root cause analysis to help isolate the issue in the least amount of time?

Options:
A.

Check the Zscaler Trust page for any indications of cloud outages or incidents that would be causing a slowdown.

B.

Check the user's ZDX score for a period of low score for AWS and use Analyze Score to get the ZDX Y-Engine analysis.

C.

Do a Deep Trace on the user's traffic and check for excessive DNS resolution times and other slowdowns.

D.

Initiate a packet capture from Zscaler Client Connector and escalate the case to have the trace analyzed for root cause.

Questions 19

The Zscaler platform can protect against malicious files, URLs and content based on a number of criteria including reputation type. What type of checking is virus scanning?

Options:
A.

Malware protection

B.

File reputation

C.

SHA-256 hashing

D.

Site reputation

Questions 20

Which of the following are correct request methods when configuring a URL filtering rule with a Caution action?

Options:
A.

Connect, Get, Head

B.

Options, Delete, Put

C.

Get, Delete, Trace

D.

Connect, Post, Put

Exam Code: ZDTA
Certification Provider: Zscaler
Exam Name: Zscaler Digital Transformation Administrator
Last Update: Sep 13, 2025
Questions: 125