TRANSFORMATION
ADMINISTRATOR (ZDTA)
CERTIFICATION EXAM 100%
CORRECT
,Primary use of policies based on file types in Zscaler DLP - ANSWERSTo protect data
by allowing or blocking specific file types and activities.
Three levels of inspection used by Zscaler DLP for file type enforcement -
ANSWERSMagic Bytes, Mime Type, and File Extension.
Reason for multiple levels of inspection for file types in Zscaler - ANSWERSTo prevent
users from bypassing policies by changing file extensions.
Predefined dictionaries in Zscaler DLP - ANSWERSClassifiers used to identify sensitive
data like PCI, PII, and PHI data.
Actions triggered by an EDM in Zscaler DLP - ANSWERSActions based on exact
matches of sensitive data elements, such as blocking or alerting on data exfiltration.
Main purpose of Out-of-Band Data Protection in Zscaler - ANSWERSTo secure data at
rest in SaaS-based services and public cloud infrastructure.
Key use case for out-of-band data protection in Zscaler - ANSWERSData discovery and
data at rest introspection.
Focus of SaaS Security Posture Management (SSPM) - ANSWERSCloud
misconfiguration, compliance, and third-party app connections.
Example of a predefined dictionary used in Zscaler DLP - ANSWERSA credit card
number dictionary.
Custom dictionary in Zscaler DLP - ANSWERSA dictionary created by customers using
specific phrases, keywords, patterns, and regular expressions.
Use of custom dictionaries in Zscaler DLP - ANSWERSTo protect documents with
specific headers and footers like 'company-confidential' or 'internal-use only'.
Exact Data Match (EDM) in Zscaler DLP - ANSWERSA feature that matches specific
data elements from a customer's structured data to trigger DLP policies.
How sensitive data is fed to Zscaler's EDM engine - ANSWERSBy using an on-
premises VM that indexes the data and sends hashes to the Zscaler cloud.
What happens to data fed into Zscaler's EDM engine - ANSWERSIt is converted into
hashes and tokens which are stored in the cloud.
,How SSPM helps with compliance - ANSWERSBy mapping misconfigurations to
different compliance frameworks like PCI, GDPR, etc.
Example of a misconfiguration identified by SSPM - ANSWERSFailing to enable multi-
factor authentication for Office 365 apps.
How SSPM handles third-party app connections - ANSWERSBy discovering and
managing third-party apps connected to cloud applications via API tokens.
Three notification methods in Zscaler for incident management - ANSWERSBrowser-
based notifications, Slack/Teams connectors, and Zscaler Client Connector pop-ups.
How admins can delegate incident management tasks back to users -
ANSWERSThrough browser-based notifications, Slack/Teams connectors, or Zscaler
Client Connector pop-ups.
Benefit of using Zscaler's predefined dictionaries - ANSWERSThey are based on
standard regex and PCRE engines.
How Zscaler ensures no sensitive data is stored during EDM - ANSWERSBy storing
only hashes and tokens, not the exact data.
First step in leveraging Zscaler's support services for troubleshooting -
ANSWERSUtilizing the Self Help support options offered by Zscaler.
Where to go for questions about Zscaler's features and basic troubleshooting -
ANSWERSZscaler Help Documentation Portal.
Content of the Zscaler Knowledgebase (KB) - ANSWERSDocumentation on specific
symptoms and solutions maintained by Global Customer Service Engineers.
Purpose of Zscaler Communities Zenith Community - ANSWERSTo engage in
discussions about Zscaler products, solutions, programs, events, and training.
Areas to localize when troubleshooting an Internet access issue with Zscaler -
ANSWERSEnd user's device, local network, corporate firewall, Zscaler Cloud, identity
provider, between Zscaler and internet, and Zscaler service.
Next step after localizing the issue in the Zscaler Troubleshooting Process -
ANSWERSIsolate which logical process is failing.
Admin capabilities with email notifications in Zscaler incident management -
ANSWERSReceive alerts about DLP and CASB incidents.
Protocol used for incident management in Zscaler - ANSWERSSecureICA protocol.
, Types of logs set in Zscaler Client Connector - ANSWERSError, Warn, Info, and Debug
logs.
Where to export logs from in Zscaler Client Connector - ANSWERSRight-click on the
Tray Icon or use the Export Logs option in debug mode.
What to check in the Logs for installation issues - ANSWERSSetupapi.dev logs.
How to collect SAML logs - ANSWERSUsing browser's Developer Tools or Fiddler, and
the SAML Message Decoder extension.
Purpose of the Zscaler Trust page - ANSWERSTo provide information on the overall
status of Zscaler services, service availability, recent incidents, advisories, and
maintenance notifications.
Premium Support in Zscaler - ANSWERSA paid upgrade from standard support that
includes elevated services such as a Technical Account Manager (TAM).
How to enable remote assistance in Zscaler - ANSWERSEnable Read Only mode to
allow support team to review configurations.
How customers without Zscaler console access can submit support tickets -
ANSWERSVia a web form.
Information to include in the Issue Subject field of a support ticket - ANSWERSA
summary of the problem with the main symptom and scope.
Triggers for gathering specific information for Zscaler support - ANSWERSIssue type,
such as Traffic Forwarding Method, Zscaler Cloud, Data Centers used, problem period,
issue scope, trigger event, and work-around.
Integration of Zscaler logs with SIEM tools - ANSWERSBy streaming real-time logs to
feed into the SIEM.
Purpose of the Zscaler Client Connector pop-up - ANSWERSTo communicate with
users about blocked transactions and ask for justifications.
Support options available for troubleshooting in Zscaler - ANSWERSSelf Help support,
reporting capabilities, and support ticket raising.
Role of the on-premises VM in Zscaler EDM - ANSWERSIt serves as the index tool for
structured data.
Key feature of Zscaler's predefined dictionaries for medical data - ANSWERSIdentifying
ICD-10 and CPT codes.