New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Netskope NCCSI NSK200 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Your customer has deployed the Netskope client to secure their Web traffic. Recently, they have enabled Cloud Firewall (CFW) to secure all outbound traffic for their endpoints. Through a recent acquisition, they must secure all outbound traffic at several remote offices where they have access to the local security stack (routers and firewalls). They cannot install the Netskope client.

Options:

A.

They can configure Reverse Proxy integrated with their IdP.


B.

They can deploy Netskope’s DPOP to steer the targeted traffic to the Netskope Security Cloud.


C.

They can use IPsec and GRE tunnels with Cloud Firewall.


D.

They can secure the targeted outbound traffic using Netskope’s Cloud Threat Exchange (CTE).


Expert Solution
Questions # 12:

Review the exhibit.

Question # 12

You are asked to restrict users from accessing YouTube content tagged as Sport. You created the required real-time policy; however, users can still access the content

Referring to the exhibit, what is the problem?

Options:

A.

The website is in a steering policy exception.


B.

The policy changes have not been applied.


C.

The YouTube content cannot be controlled.


D.

The traffic matched a Do Not Decrypt policy


Expert Solution
Questions # 13:

You are given an MD5 hash of a file suspected to be malware by your security incident response team. They ask you to offer insight into who has encountered this file and from where was the threat initiated. In which two Skope IT events tables would you search to find the answers to these questions? (Choose two.)

Options:

A.

Application Events


B.

Network Events


C.

Alerts


D.

Page Events


Expert Solution
Questions # 14:

Review the exhibit.

Question # 14

Referring to the exhibit, which three statements are correct? (Choose three.)

Options:

A.

The request was processed successfully.


B.

A request was submitted to extract application event details.


C.

An invalid token was used.


D.

The request was limited to the first 5000 records.


E.

The request was confined to only the "Professional Networking and Social" category.


Expert Solution
Questions # 15:

Review the exhibit.

add log-upload syslogng parserconfig set log-upload syslogng parserconfig 0

logsource <log-source>

You are asked to deploy a virtual appliance OPLP to accept syslog messages directly from the enterprise Palo Alto Networks firewall. You believe that you have configured the OPLP to accept the firewall logs, yet they are not appearing in Risk Insights. Referring to the exhibit, which parser name would be required to complete the new configuration?

Options:

A.

panw-syslog


B.

sfwder


C.

custom-csv


D.

squid


Expert Solution
Questions # 16:

A city uses many types of forms, including permit applications. These forms contain personal and financial information of citizens. Remote employees download these forms and work directly with the citizens to complete them. The city wants to be able to identify and monitor the specific forms and block the employees from downloading completed forms.

Which feature would you use to accomplish this task?

Options:

A.

exact data match (EDM)


B.

regular expressions (regex)


C.

document fingerprinting


D.

optical character recognition (OCR)


Expert Solution
Questions # 17:

Your company wants to know if there has been any unusual user activity. In the UI, you go to Skope IT -> Alerts.

Which two types of alerts would you filter to find this information? (Choose two.)

Options:

A.

Alert type = uba


B.

Alert type = anomaly


C.

Alert type = malware


D.

Alert type = policy


Expert Solution
Questions # 18:

You want to provision users and groups to a Netskope tenant. You have Microsoft Active Directory servers hosted in two different forests. Which statement is true about this scenario?

Options:

A.

You can use the Netskope Adapter Tool for user provisioning.


B.

You can use the Netskope virtual appliance for user provisioning


C.

You cannot provision users until you migrate to Azure AD or Okta.


D.

You can use SCIM version 2 for user provisioning.


Expert Solution
Questions # 19:

Your IT organization is migrating its user directory services from Microsoft Active Directory to a cloud-based Identity Provider (IdP) solution, Azure AD. You are asked to adapt the Netskope user provisioning process to work with this new cloud-based IdP.

Options:

A.

Directory Importer


B.

Microsoft GPO


C.

SCIMApp


D.

Manual Import


Expert Solution
Questions # 20:

You are deploying a Netskope client in your corporate office network. You are aware of firewall or proxy rules that need to be modified to allow traffic.

Which two statements are true in this scenario? (Choose two.)

Options:

A.

You need to allow TLS 1.1 traffic to pass through the firewalls from the users' IP to all destinations.


B.

You must enable SSL decryption in the proxy to inspect the Netskope tunnel.


C.

It is recommended to allow UDP port 443 to the Netskope IP ranges to allow DTLS.


D.

You need to allow TCP port 443 to the Netskope IP ranges or domains.


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions