intra zone = within the same zone. By default this is permited without any policy being configured.
inter zone = between two different zones. By default this is blocked without any policy being configured.
I do use intra zone blocking on public access segments. Just as a security measure for the guest computers. They will not be able to attempt access between other computers connected on the guest network with this enabled. So if a bad actor gets on your guest nework, they are blocked from attempts access to other guest computers.
Intra zone blocking also gets commonly used in DMZ zones. Where you want to control server to server communications to only specific devices and protocols. This also helps with security in the event a single server is compromised there is a limit to what the hacker has access to on the server segment.