New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Netskope NCCSI NSK200 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Your customer currently only allows users to access the corporate instance of OneDrive using SSO with the Netskope client. The users are not permitted to take their laptops when vacationing, but sometimes they must have access to documents on OneDrive when there is an urgent request. The customer wants to allow employees to remotely access OneDrive from unmanaged devices while enforcing DLP controls to prohibit downloading sensitive files to unmanaged devices.

Which steering method would satisfy the requirements for this scenario?

Options:

A.

Use a reverse proxy integrated with their SSO.


B.

Use proxy chaining with their cloud service providers integrated with their SSO.


C.

Use a forward proxy integrated with their SSO.


D.

Use a secure forwarder integrated with an on-premises proxy.


Expert Solution
Questions # 2:

Your learn is asked to Investigate which of the Netskope DLP policies are creating the most incidents. In this scenario, which two statements are true? (Choose two.)

Options:

A.

The Skope IT Applications tab will list the top five DLP policies.


B.

You can see the top Ave DLP policies triggered using the Analyze feature


C.

You can create a report using Reporting or Advanced Analytics.


D.

The Skope IT Alerts tab will list the top five DLP policies.


Expert Solution
Questions # 3:

Which object would be selected when creating a Malware Detection profile?

Options:

A.

DLP profile


B.

File profile


C.

Domain profile


D.

User profile


Expert Solution
Questions # 4:

Which statement describes how Netskope's REST API, v1 and v2, handles authentication?

Options:

A.

Both REST API v1 and v2 require the use of tokens to make calls to the API


B.

Neither REST API v1 nor v2 require the use of tokens.


C.

REST API v2 requires the use of a token to make calls to the API. while API vl does not.


D.

REST API v1 requires the use of a token to make calls to the API. while API v2 does not.


Expert Solution
Questions # 5:

You are asked to grant access for a group of users to an application using NPA. So far, you have created and deployed the publisher and created a private application using the Netskope console.

Which two steps must also be completed to enable your users access to the application? (Choose two.)

Options:

A.

Create an inbound firewall rule to permit network traffic to reach the publisher


B.

Enable traffic steering for private applications.


C.

Create a Real-time Protection policy that allows your users to access the application.


D.

Define an application instance name in Skope IT.


Expert Solution
Questions # 6:

You are using the Netskope DLP solution. You notice that valid credit card numbers in a file that you just uploaded to an unsanctioned cloud storage solution are not triggering a policy violation. You can see the Skope IT application events for this traffic but no DLP alerts.

Which statement is correct in this scenario?

Options:

A.

Netskope client is not enabled.


B.

You have set the severity threshold to a higher value.


C.

Netskope client is enabled, but API protection for the SaaS application is not configured.


D.

Credit card numbers are entered with a space or dash separator and not as a 16-digit consecutive number.


Expert Solution
Questions # 7:

You want to prevent a document stored in Google Drive from being shared externally with a public link. What would you configure in Netskope to satisfy this requirement?

Options:

A.

Threat Protection policy


B.

API Data Protection policy


C.

Real-time Protection policy


D.

Quarantine


Expert Solution
Questions # 8:

Netskope support advised you to enable DTLS for belter performance. You added firewall rules to allow UDP port 443 traffic. These settings are part of which configuration element when enabled in the Netskope tenant?

Options:

A.

Real-time Protection policies


B.

SSL decryption policies


C.

steering configuration


D.

client configuration


Expert Solution
Questions # 9:

You are configuring GRE tunnels from a Palo Alto Networks firewall to a Netskope tenant with the Netskope for Web license enabled. Your tunnel is up as seen from the Netskope dashboard. You are unable to ping hosts behind the Netskope gateway.

Which two statements are true about this scenario? (Choose two.)

Options:

A.

You need to call support to enable the GRE POP selection feature.


B.

Netskope only supports Web traffic through the tunnel.


C.

You can only ping the probe IP provided by Netskope.


D.

There is no client installed on the source hosts in your network.


Expert Solution
Questions # 10:

You have created a specific Skope IT application events query and want to have the query automatically run and display the results every time you log into your tenant.

Which two statements are correct in this scenario? (Choose two.)

Options:

A.

Add the Watchlist widget from the library to your home page.


B.

Export a custom Skope IT watchlist to a report and then schedule it to run daily.


C.

Save a custom Skope IT watchlist, then manage filters and share with others.


D.

Add your Skope IT query to a custom watchlist.


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions