Pass the Netskope NCCSI NSK200 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Review the exhibit.

Question # 1

Your company uses Google as the corporate collaboration suite; however, corporate policy restricts the use of personal Google services. The exhibit provides a partially completed policy to ensure that users cannot log into their personal account.

What should be added to achieve the desired outcome in this scenario?

Options:

A.

Google Gmail app


B.

User Constraint


C.

DLP profile


D.

Device classification


Expert Solution
Questions # 2:

Your customer currently only allows users to access the corporate instance of OneDrive using SSO with the Netskope client. The users are not permitted to take their laptops when vacationing, but sometimes they must have access to documents on OneDrive when there is an urgent request. The customer wants to allow employees to remotely access OneDrive from unmanaged devices while enforcing DLP controls to prohibit downloading sensitive files to unmanaged devices.

Which steering method would satisfy the requirements for this scenario?

Options:

A.

Use a reverse proxy integrated with their SSO.


B.

Use proxy chaining with their cloud service providers integrated with their SSO.


C.

Use a forward proxy integrated with their SSO.


D.

Use a secure forwarder integrated with an on-premises proxy.


Expert Solution
Questions # 3:

You are configuring GRE tunnels from a Palo Alto Networks firewall to a Netskope tenant with the Netskope for Web license enabled. Your tunnel is up as seen from the Netskope dashboard. You are unable to ping hosts behind the Netskope gateway.

Which two statements are true about this scenario? (Choose two.)

Options:

A.

You need to call support to enable the GRE POP selection feature.


B.

Netskope only supports Web traffic through the tunnel.


C.

You can only ping the probe IP provided by Netskope.


D.

There is no client installed on the source hosts in your network.


Expert Solution
Questions # 4:

You are an administrator writing Netskope Real-time Protection policies and must determine proper policy ordering.

Which two statements are true in this scenario? (Choose two.)

Options:

A.

You must place Netskope private access malware policies in the middle.


B.

You do not need to create an "allow all" Web Access policy at the bottom.


C.

You must place DLP policies at the bottom.


D.

You must place high-risk block policies at the top.


Expert Solution
Questions # 5:

A company allows their users to access OneDrive on their managed laptops. It is against corporate policy to upload any documents to their personal OneDrive. The company needs to enforce this policy to protect their customer’s sensitive data.

What are two ways to enforce this policy? (Choose two.)

Options:

A.

Create DLP policies to block the upload of all the identified documents.


B.

Create DLP policies to allow document uploading only to the corporate OneDrive instance.


C.

Create a new application instance for the corporate OneDrive.


D.

Fingerprint all the documents to have a catalog of all the documents that the company needs to protect.


Expert Solution
Questions # 6:

Review the exhibit.

Question # 6

You are troubleshooting a Netskope client for user Clarke which remains in a disabled state after being installed. After looking at various logs, you notice something which might explain the problem. The exhibit is an excerpt from the nsADImporterLog.log.

Referring to the exhibit, what is the problem?

Options:

A.

The client was not Installed with administrative privileges.


B.

The Active Directory user is not synchronized to the Netskope tenant.


C.

This is normal; it might take up to an hour to be enabled.


D.

The client traffic is decrypted by a network security device.


Expert Solution
Questions # 7:

Review the exhibit.

Question # 7

You are at the Malware Incident page. A virus was detected by the Netskope Heuristics Engine. Your security team has confirmed that the virus was a test data file You want to allow the security team to use this file

Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.

Click the "Add To File Filter button to add the IOC to a file list.


B.

Contact the CrowdStrike administrator to have the file marked as safe.


C.

Click the ''Lookup VirusTotal" button to verify if this IOC is a false positive.


D.

Create a malware detection profile and update the file hash list with the IOC.


Expert Solution
Questions # 8:

You want to prevent a document stored in Google Drive from being shared externally with a public link.

Options:

A.

Quarantine


B.

Threat Protection policy


C.

API Data Protection policy


D.

Real-time Protection policy


Expert Solution
Questions # 9:

Your company wants to deploy Netskope using a tunnel because you have a mixture of device operating systems. You also do not want to enable encryption because you want to maximize bandwidth.

Options:

A.

explicit proxy


B.

IPsec


C.

proxy chaining


D.

GRE


Expert Solution
Questions # 10:

Your company has many users that are remote and travel often. You want to provide the greatest visibility into their activities, even while traveling.

Using Netskope, which deployment method would be used in this scenario?

Options:

A.

Use a Netskope client.


B.

Use an IPsec tunnel.


C.

Use a GRE tunnel.


D.

Use proxy chaining.


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions