Pass the Netskope NCCSI NSK200 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

You discover the ongoing use of the native Dropbox client in your organization. Although Dropbox is not a corporate-approved application, you do not want to prevent the use of Dropbox. You do, however, want to ensure visibility into its usage.

Options:

A.

Change Windows and Mac steering exception actions to use Tunnel mode and set Netskope as the source IP address for SSO services.


B.

Modify the existing tenant steering exception configuration to block the Dropbox native application to force users to use the Dropbox website.


C.

Remove all Dropbox entries from the tenant steering SSL configuration entirely.


D.

Create a new tenant steering exception type of Destination Locations that contains the Dropbox application.


Expert Solution
Questions # 12:

You are integrating Netskope tenant administration with an external identity provider. You need to implement role-based access control. Which two statements are true about this scenario? (Choose two.)

Options:

A.

The roles you want to assign must be present in the Netskope tenant.


B.

You do not need to define the administrators locally in the Netskope tenant after It Is integrated with IdP.


C.

You need to define the administrators locally in the Netskope tenant.


D.

Once integrated with IdP. you must append the "locallogin" URL to log in using IdP


Expert Solution
Questions # 13:

You are comparing the behavior of Netskope's Real-time Protection policies to API Data Protection policies. In this Instance, which statement is correct?

Options:

A.

All real-time policies are enforced, regardless of sequential order, while API policies are analyzed sequentially from top to bottom and stop once a policy Is matched.


B.

Both real-time and API policies are analyzed sequentially from top to bottom and stop once a policy Is matched.


C.

All API policies are enforced, regardless of sequential order, while real-time policies are analyzed sequentially from top to bottom and stop once a policy Is matched.


D.

Both real-time and API policies are all enforced, regardless of sequential order.


Expert Solution
Questions # 14:

You are having issues with fetching user and group Information periodically from the domain controller and posting that information to your tenant instance in the Netskope cloud. To begin the troubleshooting process, what would you Investigate first in this situation?

Options:

A.

On-Premises Log Parser


B.

Directory Importer


C.

DNS Connector


D.

AD Connector


Expert Solution
Questions # 15:

Your organization has a homegrown cloud application. You are required to monitor the activities that users perform on this cloud application such as logins, views, and downloaded files. Unfortunately, it seems Netskope is unable to detect these activities by default.

How would you accomplish this goal?

Options:

A.

Enable access to the application with Netskope Private Access.


B.

Ensure that the cloud application is added as a steering exception.


C.

Ensure that the application is added to the SSL decryption policy.


D.

Create a new cloud application definition using the Chrome extension.


Expert Solution
Questions # 16:

You are creating an API token to allow a DevSecOps engineer to create and update a URL list using REST API v2. In this scenario, which privilege(s) do you need to create in the API token?

Options:

A.

Provide read and write access for the "/events" endpoint.


B.

Provide read and write access for the "/urllist" endpoint.


C.

Provide only read access for the "/urllist" endpoint.


D.

Provide only write access for the "/urllist" endpoint.


Expert Solution
Questions # 17:

You are using Skope IT to analyze and correlate a security incident. You are seeing too many events generated by API policies. You want to filter for logs generated by the Netskope client only.

Options:

A.

Use the access_method filter and select Client from the dropdown menu.


B.

Use the access_method filter and select Tunnel from the dropdown menu.


C.

Use the access_method filter and select Logs from the dropdown menu.


D.

Use query mode and use access_method neq Client.


Expert Solution
Questions # 18:

You are using the Netskope DLP solution. You notice flies containing test data for credit cards are not triggering DLP events when uploaded to Dropbox. There are corresponding page events. Which two scenarios would cause this behavior? (Choose two.)

Options:

A.

The Netskope client Is not steering Dropbox traffic.


B.

The DLP rule has the severity threshold set to a value higher than the number of occurrences.


C.

The credit card numbers in your test data are Invalid 16-dlglt numbers.


D.

There is no API protection configured for Dropbox.


Expert Solution
Questions # 19:

Your customer has deployed the Netskope client to secure their Web traffic. Recently, they have enabled Cloud Firewall (CFW) to secure all outbound traffic for their endpoints. Through a recent acquisition, they must secure all outbound traffic at several remote offices where they have access to the local security stack (routers and firewalls). They cannot install the Netskope client.

Options:

A.

They can configure Reverse Proxy integrated with their IdP.


B.

They can deploy Netskope’s DPOP to steer the targeted traffic to the Netskope Security Cloud.


C.

They can use IPsec and GRE tunnels with Cloud Firewall.


D.

They can secure the targeted outbound traffic using Netskope’s Cloud Threat Exchange (CTE).


Expert Solution
Questions # 20:

You are currently migrating users away from a legacy proxy to the Netskope client in the company’s corporate offices. You have deployed the client to a pilot group; however, when the client attempts to connect to Netskope, it fails to establish a tunnel.

In this scenario, what would cause this problem?

Options:

A.

The legacy proxy is intercepting SSL/TLS traffic to Netskope.


B.

The corporate firewall is blocking UDP port 443 to Netskope.


C.

The corporate firewall is blocking the Netskope EPoT address.


D.

The client cannot reach dns.google for EDNS resolution.


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions