Pass the Netskope NCCSI NSK200 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

What is the purpose of the file hash list in Netskope?

Options:

A.

It configures blocklist and allowlist entries referenced in the custom Malware Detection profiles.


B.

It is used to allow and block URLs.


C.

It provides the file types that Netskope can inspect.


D.

It provides Client Threat Exploit Prevention (CTEP).


Expert Solution
Questions # 22:

Your IT organization is migrating its user directory services from Microsoft Active Directory to a cloud-based Identity Provider (IdP) solution, Azure AD. You are asked to adapt the Netskope user provisioning process to work with this new cloud-based IdP.

Options:

A.

Directory Importer


B.

Microsoft GPO


C.

SCIMApp


D.

Manual Import


Expert Solution
Questions # 23:

While most Web and SaaS traffic is decrypted for inspection, you are asked to prevent a certain host on the network from SSL decryption for privacy purposes.

Options:

A.

Create a steering exception for the host.


B.

Create a Real-time Protection policy, select the host, and choose to block SSL decryption.


C.

Create a Source Network Location for a Do Not Decrypt SSL policy.


D.

Add the host to the certificate-pinned application list.


Expert Solution
Questions # 24:

You are implementing tenant access security and governance controls for privileged users. You want to start with controls that are natively available within the Netskope Cloud Security Platform and do not require external or third-party integration.

Which three access controls would you use in this scenario? (Choose three.)

Options:

A.

IP allowlisting to control access based upon source IP addresses.


B.

Login attempts to set the number of failed attempts before the admin user is locked out of the Ul.


C.

Applying predefined or custom roles to limit the admin's access to only those functions required for their job.


D.

Multi-factor authentication to verify a user's authenticity.


E.

History-based access control based on past security actions.


Expert Solution
Questions # 25:

Netskope is being used as a secure Web gateway. Your organization's URL list changes frequently. In this scenario, what makes It possible for a mass update of the URL list in the Netskope platform?

Options:

A.

REST API v2


B.

Assertion Consumer Service URL


C.

Cloud Threat Exchange


D.

SCIM provisioning


Expert Solution
Questions # 26:

You are troubleshooting an issue with Microsoft where some users complain about an issue accessing OneDrive and SharePoint Online. The configuration has the Netskope client deployed and active for most users, but some Linux machines are routed to Netskope using GRE tunnels. You need to disable inspection for all users to begin troubleshooting the issue.

In this scenario, how would you accomplish this task?

Options:

A.

Create a Real-time Protection policy to isolate Microsoft 365.


B.

Create a Do Not Decrypt SSL policy for the Microsoft 365 App Suite.


C.

Create a steering exception for the Microsoft 365 domains.


D.

Create a Do Not Decrypt SSL policy for OneDrive.


Expert Solution
Questions # 27:

You have created a specific Skope IT application events query and want to have the query automatically run and display the results every time you log into your tenant.

Which two statements are correct in this scenario? (Choose two.)

Options:

A.

Add the Watchlist widget from the library to your home page.


B.

Export a custom Skope IT watchlist to a report and then schedule it to run daily.


C.

Save a custom Skope IT watchlist, then manage filters and share with others.


D.

Add your Skope IT query to a custom watchlist.


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions