New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Netskope NCCSI NSK200 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

To which three event types does Netskope's REST API v2 provide access? (Choose three.)

Options:

A.

application


B.

alert


C.

client


D.

infrastructure


E.

user


Expert Solution
Questions # 22:

You are troubleshooting private application access from a user's computer. The user is complaining that they cannot access the corporate file share; however, the private tunnel seems to be established. You open the npadebuglog.log file in a text editor and cannot find any reference to the private application.

Options:

A.

The absence of npadebuglog.log entries is not significant.


B.

File shares cannot be published using private access.


C.

The user is not added to the required real-time policy.


D.

The user needs to re-authenticate for private applications.


Expert Solution
Questions # 23:

You have deployed a development Web server on a public hosting service using self-signed SSL certificates. After some troubleshooting, you determined that when the Netskope client is enabled, you are unable to access the Web server over SSL. The default Netskope tenant steering configuration is in place.

In this scenario, which two settings are causing this behavior? (Choose two.)

Options:

A.

SSL pinned certificates are blocked.


B.

Untrusted root certificates are blocked.


C.

Incomplete certificate trust chains are blocked.


D.

Self-signed server certificates are blocked.


Expert Solution
Questions # 24:

What is the purpose of the file hash list in Netskope?

Options:

A.

It configures blocklist and allowlist entries referenced in the custom Malware Detection profiles.


B.

It is used to allow and block URLs.


C.

It provides the file types that Netskope can inspect.


D.

It provides Client Threat Exploit Prevention (CTEP).


Expert Solution
Questions # 25:

While most Web and SaaS traffic is decrypted for inspection, you are asked to prevent a certain host on the network from SSL decryption for privacy purposes.

Options:

A.

Create a steering exception for the host.


B.

Create a Real-time Protection policy, select the host, and choose to block SSL decryption.


C.

Create a Source Network Location for a Do Not Decrypt SSL policy.


D.

Add the host to the certificate-pinned application list.


Expert Solution
Questions # 26:

Your organization has three main locations with 30.000 hosts in each location. You are planning to deploy Netskope using iPsec tunnels for security.

What are two considerations to make a successful connection in this scenario? (Choose two.)

Options:

A.

browsers in use


B.

operating systems


C.

redundant POPs


D.

number of hosts


Expert Solution
Questions # 27:

Your customer has some managed Windows-based endpoints where they cannot add any clients or agents. For their users to have secure access to their SaaS application, you suggest that the customer use Netskope's Explicit Proxy.

Which two configurations are supported for this use case? (Choose two.)

Options:

A.

Endpoints can be configured to directly use the Netskope proxy.


B.

Endpoints must have separate steering configurations in the tenant settings.


C.

Endpoints must be configured in the device section of the tenant to interoperate with all proxies.


D.

Endpoints can be configured to use a Proxy Auto Configuration (PAC) file.


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions