Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Netskope NSK101 - Netskope Certified Cloud Security Administrator (NCCSA)

Page: 3 / 4
Total 129 questions

An administrator wants to determine to which data plane a user is traversing. In this scenario, what are two ways to accomplish this task? (Choose two.)

A.

Settings -> Security Cloud Platform -> Devices

B.

Settings -> Security Cloud Platform -> Client Configuration

C.

SkopeIT -> Alerts -> View Details

D.

System Tray -> Configuration

Click the Exhibit button.

Referring to the exhibit, you have a user reporting that a blocked website is needed for legitimate business reasons. Upon review, you determine that the user has been blocked by the Global Block policy. You need to create an exception forthat domain. You create a custom URL list that includes the domain.

In this scenario, which two actions would allow this access? (Choose two.)

A.

Create a custom category with the custom URL list as an included URL list and add it to an allow policy below the triggered Global Block policy.

B.

Create a custom category with the custom URL list as an included URL list and add it to an allow policy above the triggered Global Block policy.

C.

Add the custom URL list as an excluded URL list to the category in the Global Allow policy.

D.

Add the custom URL list as an excluded URL list to the category in the Global Block policy.

You are creating a real-time policy for cloud applications.

In addition to users, groups, and organizational units, which two source criteria would support this scenario? (Choose two.)

A.

protocol version

B.

access method

C.

browser version

D.

device classification

Which networking function does a SASE solution provide above and beyond an SSE solution?

A.

Secure Web Gateway

B.

Cloud Access Security Broker

C.

Data Loss Prevention

D.

Software Defined Wide Area Network

Your organization has implemented Netskope Private Access (NPA) for all users. Users from the European region are reporting that they are unable to access many of their applications. You suspect that the publishers for the European data center may be disconnected and you want to verify the Publishers' status.

Which two methods describe how you would accomplish this task? (Choose two.)

A.

Use the Status field on the Publishers page.

B.

Use the Network Events page in

C.

Use the Netskope Private Access Troubleshooter.

D.

Use the Private Apps page in

You are adding a new tenant administrator in the Admins page. Which additional security measure would you be able to enable for only this new account?

A.

Activate SSO authentication using an external identity provider.

B.

Activate MFA to log in to the Netskope management console.

C.

Set the password expiration.

D.

Add the administrator to the Administration Audit Log.

A user has performed a bulk delete activity. In this scenario, which Netskope feature monitors potential risky users for a malicious activity that would cause data loss?

A.

Netskope's Threat Protection inline policies

B.

Netskope's Behavior Analytics rule-based policies

C.

Netskope's API Data Protection policies

D.

Netskope's Cloud Threat Exchange integration

You are required to provide an additional pop-up warning to users before allowing them to proceed to Web applications categorized as "low" or "poor" by Netskope's Cloud Confidence Index. Which action would allow you to accomplish this task?

A.

Enable RBI on the uncategorized domains

B.

Create a policy limiting usage of generative AI.

C.

Redirect the user to the company banner page for the Web usage policy.

D.

Enable real-time user coaching based on CCL.

Your customer asks you to secure all Web traffic as part of the initial configuration. In the Netskope platform, which statement is correct in this scenario?

A.

Add the all Web traffic option to the steering configuration.

B.

Netskope automatically steers all Web traffic.

C.

Netskope cannot steer Web traffic.

D.

Select all Web traffic in the SSL decryption section.

Which two statements are correct about Netskope’s NewEdge Security Cloud Network Infrastructure? (Choose two.)

A.

It utilizes virtual POPs for traffic onboarding ensuring low latency.

B.

It includes direct peering with Microsoft and Google in every data center.

C.

It is a private security cloud network that is over-provisioned, elastic, and built for scale.

D.

It utilizes multiple public cloud providers for inline services ensuring high availability and elasticity.