Pass the Netskope NCCSA NSK101 Questions and answers with CertsForce

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

You are working with traffic from applications with pinned certificates. In this scenario, which statement is correct?

Options:

A.

An exception should be added to the steering configuration.


B.

The domains used by certificate-pinned applications should be added to the authentication bypass list.


C.

Traffic with pinned certificates should be blocked.


D.

The domains used by applications with pinned certificates should be allowed in an inline policy.


Expert Solution
Questions # 2:

You have applied a DLP Profile to block all Personally Identifiable Information data uploads to Microsoft 365 OneDrive. DLP Alerts are not displayed and no OneDrive-related activities are displayed in the Skope IT App Events table.

In this scenario, what are two possible reasons for this issue? (Choose two.)

Options:

A.

The Cloud Storage category is in the Steering Configuration as an exception.


B.

The destination domain is excluded from decryption in the decryption policy.


C.

A Netskope POP is not in your local country and therefore DLP policies cannot be applied.


D.

DLP policies do not apply when using IPsec as a steering option.


Expert Solution
Questions # 3:

You want to set up a Netskope API connection to Box.

What two actions must be completed to enable this connection? (Choose two.)

Options:

A.

Install the Box desktop sync client.


B.

Authorize the Netskope application in Box.


C.

Integrate Box with the corporate IdP.


D.

Configure Box in SaaS API Data protection.


Expert Solution
Questions # 4:

You just deployed the Netskope client in Web mode and several users mention that their messenger application is no longer working. Although you have a specific real-time policy that allows this application, upon further investigation you discover that it is using proprietary encryption. You need to permit access to all the users and maintain some visibility.

In this scenario, which configuration change would accomplish this task?

Options:

A.

Change the real-time policy to block the messenger application.


B.

Create a new custom cloud application using the custom connector that can be used in the real-time policy.


C.

Add a policy in the SSL decryption section to bypass the messenger domain(s).


D.

Edit the steering configuration and add a steering exception for the messenger application.


Expert Solution
Questions # 5:

You want to enable Netskope to gain visibility into your users' cloud application activities in an inline mode.

In this scenario, which two deployment methods would match your inline use case? (Choose two.)

Options:

A.

Use a forward proxy.


B.

Use an API connector


C.

Use a log parser.


D.

Use a reverse proxy.


Expert Solution
Questions # 6:

The Netskope deployment for your organization is deployed in CASB-only mode. You want to view dropbox.com traffic but do not see it when using SkopeIT.

In this scenario, what are two reasons for this problem? (Choose two.)

Options:

A.

The Dropbox Web application is certificate pinned and cannot be steered to the Netskope tenant.


B.

The Dropbox domains have not been configured to steer to the Netskope tenant.


C.

The Dropbox desktop application is certificate pinned and cannot be steered to the Netskope tenant.


D.

The Dropbox domains are configured to steer to the Netskope tenant.


Expert Solution
Questions # 7:

You are working with a large retail chain and have concerns about their customer data. You want to protect customer credit card data so that it is never exposed in transit or at rest. In this scenario, which regulatory compliance standard should be used to govern this data?

Options:

A.

SOC 3


B.

PCI-DSS


C.

AES-256


D.

ISO 27001


Expert Solution
Questions # 8:

A customer wants to detect misconfigurations in their AWS cloud instances.

In this scenario, which Netskope feature would you recommend to the customer?

Options:

A.

Netskope Secure Web Gateway (SWG)


B.

Netskope Cloud Security Posture Management (CSPM)


C.

Netskope Advanced DLP and Threat Protection


D.

Netskope SaaS Security Posture Management (SSPM)


Expert Solution
Questions # 9:

Which three technologies describe the primary cloud service models as defined by the National Institute of Standards and Technology (NIST)? (Choose three.)

Options:

A.

Cloud Service Provider (CSP)


B.

Identity as a Service (IDaaS)


C.

Platform as a Service (PaaS)


D.

Software as a Service (SaaS)


E.

Infrastructure as a Service (laaS)


Expert Solution
Questions # 10:

Exhibit

Question # 10

A user is connected to a cloud application through Netskope's proxy.

In this scenario, what information is available at Skope IT? (Choose three.)

Options:

A.

username. device location


B.

destination IP. OS patch version


C.

account instance, URL category


D.

user activity, cloud app risk rating


E.

file version, shared folder


Expert Solution
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions