Pass the Netskope NCCSA NSK101 Questions and answers with CertsForce

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

In the Tenant III, which two methods would an administrator use to update a File Profile with malicious file hashes? (Choose two)

Options:

A.

Upload a CSV file of malicious file hashes.


B.

Create a Threat Protection Profile to define a block list of malicious files.


C.

Input a list of malicious file hashes.


D.

Upload a JSON file of malicious file hashes.


Expert Solution
Questions # 32:

You want to block access to sites that use self-signed certificates. Which statement is true in this scenario?

Options:

A.

Certificate-related settings apply globally to the entire customer tenant.


B.

Certificate-related settings apply to each individual steering configuration level.


C.

Certificate-related settings apply to each individual client configuration level.


D.

Self-signed certificates must be changed to a publicly trusted CA signed certificate.


Expert Solution
Questions # 33:

What information is displayed in an application's Cloud Confidence Index (CCI) page? (Choose two.)

Options:

A.

top users by sessions


B.

policy violations


C.

GDPR readiness


D.

stock price


Expert Solution
Questions # 34:

Exhibit

Question # 34

Which portion of the interface shown in the exhibit allows an administrator to set severity, assign ownership, track progress, and perform forensic analysis with excerpts of violating content?

Options:

A.

Skope IT-> Alerts


B.

Incidents -> DLP


C.

API-enabled Protection -> Inventory


D.

Reports -> New Report


Expert Solution
Questions # 35:

Your company started deploying the latest version of the Netskope Client and you want to track the progress and device count using Netskope.

Which two statements are correct in this scenario? (Choose two.)

Options:

A.

Use Netskope Digital Experience Management to monitor the status.


B.

Use the Devices page under Settings to view and filter the required data.


C.

Review the Group definitions under Settings to determine the number of deployed clients.


D.

Review the Steering Configuration to determine the number of deployed clients.


Expert Solution
Questions # 36:

As an administrator, you need to configure the Netskope Admin UI to be accessible by specific IP addresses and to display a custom message after the admin users have been authenticated.

Which two statements are correct in this scenario? (Choose two.)

Options:

A.

Add the specific IP addresses on the IP Allow List.


B.

Configure and enable the Privacy Notice to display the custom message.


C.

Add the specific IP addresses on the Network Location.


D.

Enable and set the User Notification Template to display the custom message.


Expert Solution
Questions # 37:

Which two cloud security and infrastructure enablement technologies does Secure Access Service Edge (SASE) combine into its unified platform? (Choose two.)

Options:

A.

Distributed Denial of Service Protection (DDoS)


B.

Zero Trust Network Access (ZTNA)


C.

Cloud Access Security Broker (CASB)


D.

Unified Threat Management (UTM)


Expert Solution
Questions # 38:

You are required to present a view of all upload activities completed by users tunneled from the Los Angeles office to cloud storage applications.

Which two basic filters would you use on the SkopeIT Applications page to satisfy this requirement? (Choose two.)

Options:

A.

Activity


B.

Access Method


C.

Action


D.

CCL


Expert Solution
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions