Zscaler ZDTA Exam (page: 3)
Zscaler Digital Transformation Administrator
Updated on: 07-Feb-2026

Viewing Page 3 of 17

What is the immediate outcome or effect when the Zscaler Office 365 One Click Rule is enabled?

  1. All traffic undergoes mandatory SSL inspection.
  2. Office 365 traffic is exempted from SSL inspection and other web policies.
  3. Non-Office 365 traffic is blocked.
  4. All Office 365 drive traffic is blocked.

Answer(s): B

Explanation:

When the Zscaler Office 365 One Click Rule is enabled, Office 365 traffic is exempted from SSL inspection and other web policies to optimize performance and user experience. This rule simplifies policy configuration by automatically identifying and excluding Office 365 cloud traffic from inspection, reducing latency and avoiding potential conflicts with Office 365 services. The study guide clarifies that this rule helps balance security with seamless cloud application usage.



The Forwarding Profile defines which of the following?

  1. Fallback methods and behavior when a DTLS tunnel cannot be established
  2. Application PAC file location
  3. System PAC file when off trusted network
  4. Fallback methods and behavior when a TLS tunnel cannot be established

Answer(s): A

Explanation:

The Forwarding Profile in Zscaler defines the fallback methods and behavior when a DTLS tunnel cannot be established. This profile governs how traffic should be forwarded if the preferred DTLS (Datagram Transport Layer Security) tunnel fails, ensuring continuity by falling back to alternative methods such as TLS or other configured options. It is critical to maintaining secure and resilient connectivity paths for traffic forwarding.
The study guide clarifies that this forwarding profile specifically addresses DTLS fallback behavior to maintain session reliability.



What is the default timer in ZDX Advanced for web probes to be sent?

  1. 1 minute
  2. 10 minutes
  3. 30 minutes
  4. 5 minutes

Answer(s): D



When configuring a ZDX custom application and choosing Type: 'Network' and completing the configuration by defining the necessary probe(s), which performance metrics will an administrator NOT get for users after enabling the application?

  1. Server Response Time
  2. ZDX Score
  3. Client Gateway IP Address
  4. Disk I/O

Answer(s): D

Explanation:

When a ZDX custom application is configured with the type set to 'Network', the administrator will not get Disk I/O metrics for users. Disk I/O metrics relate to local client device performance and are not part of network-type application probes which focus on network latency, server response, and other network-centric measurements.
The study guide notes that Disk I/O is part of endpoint-level monitoring and is not collected by network-type probes, unlike metrics such as Server Response Time or ZDX Score which are network related.



Which of the following is a common use case for adopting Zscaler's Data Protection?

  1. Reduce your Internet Attack Surface
  2. Prevent download of Malicious Files
  3. Prevent loss to Internet and Cloud Apps
  4. Securely connect users to Private Applications

Answer(s): C

Explanation:

A common use case for adopting Zscaler's Data Protection is to prevent data loss to Internet and Cloud Apps. Data protection focuses on detecting and stopping sensitive data exfiltration or leakage to unauthorized destinations over web and cloud channels.

While reducing the attack surface and blocking malicious downloads are important security functions, they are addressed by other Zscaler capabilities such as threat protection. Secure connection to private apps is covered by ZPA, not data protection. The study guide emphasizes that data protection's primary purpose is to safeguard sensitive data from being lost or leaked to internet or cloud applications.



What is a ZIA Sublocation?

  1. The section of a corporate Location used to separate traffic, like traffic from employees from guest traffic
  2. The section of a corporate Location that sends traffic to a Subcloud
  3. Every one of the sections in a Corporate Location that use overlapping IP addresses
  4. A way to separate generic traffic from that coming from Client Connector

Answer(s): A

Explanation:

A ZIA Sublocation is defined as a subsection of a corporate Location that is used to separate different types of traffic, such as traffic from employees versus guest traffic. This segmentation allows granular application of policies and better control over different user groups within the same corporate location. Sublocations help in organizing and managing traffic flows for better policy enforcement and reporting.



What does TLS Inspection for Zscaler Internet Access secure public internet browsing with?

  1. Storing connection streams for future customer review.
  2. Removing certificates and reconnecting client connection using HTTP.
  3. Intermediate certificates are created for each client connection.
  4. Logging which clients receive the original webserver certificate.

Answer(s): C

Explanation:

TLS Inspection in Zscaler Internet Access secures public internet browsing by creating intermediate certificates for each client connection. This Man-In-The-Middle approach enables Zscaler to decrypt and inspect encrypted traffic for threats and policy compliance while still maintaining secure connections with the client. The intermediate certificate acts as a trusted entity between the client and the real server during inspection.



Does the Access Control suite include features that prevent lateral movement?

  1. No. Access Control Services will only control access to the Internet and cloud applications.
  2. Yes. Controls for segmentation and conditional access are part of the Access Control Services.
  3. Yes. The Cloud Firewall will detect network segments and provide conditional access.
  4. No. The endpoint firewall will detect network segments and steer access.

Answer(s): B

Explanation:

Yes, the Access Control suite includes controls for segmentation and conditional access, which are designed to prevent lateral movement within networks. These features allow organizations to restrict access between different segments and enforce policies that limit the spread of threats or unauthorized access within internal environments.



Viewing Page 3 of 17



Share your comments for Zscaler ZDTA exam with other users:

Ashok Kumar 1/2/2024 6:53:00 AM

the correct answer to q8 is b. explanation since the mule app has a dependency, it is necessary to include project modules and dependencies to make sure the app will run successfully on the runtime on any other machine. source code of the component that the mule app is dependent of does not need to be included in the exported jar file, because the source code is not being used while executing an app. compiled code is being used instead.
Anonymous


Merry 7/30/2023 6:57:00 AM

good questions
Anonymous


VoiceofMidnight 12/17/2023 4:07:00 PM

Delayed the exam until December 29th.
UNITED STATES


Umar Ali 8/29/2023 2:59:00 PM

A and D are True
Anonymous


vel 8/28/2023 9:17:09 AM

good one with explanation
Anonymous


Gurdeep 1/18/2024 4:00:15 PM

This is one of the most useful study guides I have ever used.
CANADA