Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

ZSCALER Digital Transformation Engineer (ZDTE) Test Questions and Answers, Exams of Nursing

ZSCALER Digital Transformation Engineer (ZDTE) Test Questions and Answers

Typology: Exams

2024/2025

Available from 07/02/2025

rosze-macharia
rosze-macharia 🇬🇧

5

(5)

7.4K documents

1 / 6

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Zscaler Digital Transformation Engineer
(ZDTE)
Which metrics are collected by Web Probes? - Answer-Page Fetch Time
DNS Time
Server Response Time
Availability
Which metrics are collected by Cloud Path Probes - Answer-Hop count
Packet loss
Latency
What is a subcloud? - Answer-A subcloud is a subset of ZIA Public Service Edges, ZIA Private Service
Edges, or both.
What do iOS and Android devices use to connect to the ZTE? - Answer-Zscaler Client Connector
What are the three levels of the Zscaler Multi-Tenant Cloud Security Architecture? - Answer-Central
Authority = The Brains
Enforcement Nodes & Brokers = The Engines
Logging Services = The Memory
pf3
pf4
pf5

Partial preview of the text

Download ZSCALER Digital Transformation Engineer (ZDTE) Test Questions and Answers and more Exams Nursing in PDF only on Docsity!

Zscaler Digital Transformation Engineer

(ZDTE)

Which metrics are collected by Web Probes? - Answer-Page Fetch Time DNS Time Server Response Time Availability Which metrics are collected by Cloud Path Probes - Answer-Hop count Packet loss Latency What is a subcloud? - Answer-A subcloud is a subset of ZIA Public Service Edges, ZIA Private Service Edges, or both. What do iOS and Android devices use to connect to the ZTE? - Answer-Zscaler Client Connector What are the three levels of the Zscaler Multi-Tenant Cloud Security Architecture? - Answer-Central Authority = The Brains Enforcement Nodes & Brokers = The Engines Logging Services = The Memory

If using subcloud, what variable is returned in the PAC file? - Answer-Gateway.subcloud.zscaler.net If 2 App Connectors are insufficient for your number of apps, what should you do? - Answer-Install a third App Connector. How many active probes can a user have? - Answer-7 for ZDX Standard 30 for ZDX Advanced or Advanced Plus Which ZDX tier is required for Copilot? - Answer-ZDX Advanced Plus What are some use cases of OneAPI - Answer-URL Filtering Application Access Management Configuring App Connector Groups What is an HTTP code 429? - Answer-API rate limit exceeded What are the four stages of the Cloud Sandbox workflow? - Answer-1. Cloud Effect

  1. Prefiltered
  2. Behavioral Analysis
  3. Post-processing What do we do if a customer changes the default risk score of an application? - Answer-We immediately readjust that risk score for that specific tenant, for that specific customer. What does OneAPI use for authentication? - Answer-OAuth

What is the most significant metric when calculating a ZDX score? - Answer-Page Fetch Time What is the timeframe for a ZDX score? - Answer-A rolling 7 day window of time. What is ZDX copilot? - Answer-An AI-powered assistant that boosts productivity by providing the information users need through simple questions. This feature within the Zscaler Digital Experience (ZDX) platform enhances user navigation and optimizes functionalities using AI and machine learning. Which API client does Zscaler recommend? - Answer-Postman How many key engines does Zscaler firewall have? - Answer- What is parallel processing? - Answer-When a request is made, Zscaler evaluates all relevant policies simultaneously and enforces the strictest rule. What is ThreatParse? - Answer-An investigative feature that takes raw attack logs and reconstructs them into plain English. Which traffic is handled by Z-Tunnel 1.0? - Answer-Only HTTP and HTTPS ( ports 80 and 443) How are users added and configured in a Hosted DB? - Answer-Manually or through a CSV. LDAP can be used to authenticate to ZPA. - Answer-False. LDAP authentication applies only to Zscaler Internet Access.

How does LDAP authenticate with Zscaler? - Answer-1. Zscaler synchronizes users and groups with Active Directory

  1. Zscaler requests username
  2. Zscaler requests password
  3. Zscaler performs an LDAP BIND against Active Directory
  4. If successful, Zscaler sends an authentication token to ZCC. What are the physical Internet Service Edge types? - Answer-Service Edge 3 and Service Edge 5. Each contains either 3 or 5 enforcement nodes and an Integrated Load Balancer. Deployed in pairs with LBs in active/active. Where do you enable software and device inventory? - Answer-ZDX - Administration - Inventory Settings
  • enable Data Collection What is NSS? - Answer-Nanolog Streaming Service is used for logging in ZIA. User passes NSS logs for Web and FW to on-premises or cloud SIEM. A certificate based TLS connection is made from the NSS virtual machine to Zscaler nanolog cluster. What is LSS? - Answer-Log Streaming Service for ZPA. Uses the existing App Connector infrastructure to pull logs and pass them through to the SIEM solution. Which three components are used for Source IP Anchoring? - Answer-ZIA, ZPA, and App Connectors What is Match Count? - Answer-Match Count is the threshold that triggers a dictionary or group of dictionaries. The dictionary or dictionaries trigger only if they find more matches than the number specified. What is tenancy restriction? - Answer-Allows you to restrict access either to personal accounts, business accounts, or both for certain cloud applications.