Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Netskope NSK101 - Netskope Certified Cloud Security Administrator (NCCSA)

Page: 1 / 4
Total 129 questions

What information is displayed in an application's Cloud Confidence Index (CCI) page? (Choose two.)

A.

top users by sessions

B.

policy violations

C.

GDPR readiness

D.

stock price

Which two use cases would be considered examples of Shadow IT within an organization? (Choose two.)

A.

a sanctioned Salesforce account used by a contractor to upload non-sensitive data

B.

a sanctioned Wetransfer being used by a corporate user to share sensitive data

C.

an unsanctioned Microsoft 365 OneDrive account being used by a corporate user to upload sensitive data

D.

an unsanctioned Google Drive account used by a corporate user to upload non-sensitive data

What are two primary advantages of Netskope's Secure Access Service Edge (SASE) architecture? (Choose two.

A.

no on-premises hardware required for policy enforcement

B.

Bayesian spam filtering

C.

Endpoint Detection and Response (EDR)

D.

single management console

A new customer is concerned about performance, especially with respect to Microsoft 365. They have offices in 20 countries around the world and their workforce is mostly mobile.

In this scenario, which two statements about NewEdge would align with the customer's requirements? (Choose two.)

A.

NewEdge accurately identifies Microsoft 365 violations and data risks.

B.

NewEdge provides advanced public cloud infrastructure security.

C.

NewEdge provides direct peering with Microsoft in every data center.

D.

NewEdge delivers a single, unified network with all services available in all locations worldwide.

What correctly defines the Zero Trust security model?

A.

least privilege access

B.

multi-layered security

C.

strong authentication

D.

double encryption

What is a benefit that Netskope instance awareness provides?

A.

It prevents movement of corporate sensitive data to a personal Dropbox account.

B.

It prevents the user from copying information from a corporate email and pasting the information into a GitHub repository.

C.

It differentiates between an IT managed Google Drive instance versus a personal Dropbox account.

D.

It differentiates between an IT managed Google Drive instance versus a personal Google Drive instance.

You need to locate events for specific activities such as "edit" or "login successful" in a cloud application.

In which SkopeIT Events & Alerts page would this information be found?

A.

Endpoint Events

B.

Page Events

C.

Application Events

D.

Websites

How do you provision users to your customer's Netskope tenant? (Choose two.)

A.

Use Microsoft Intune.

B.

Use the AD Connector.

C.

Use SCIM.

D.

Use the Directory Importer.

Which two common security frameworks are used today to assess and validate a vendor's security practices? (Choose two.)

A.

Data Science Council of America

B.

Building Security in Maturity Model

C.

ISO 27001

D.

NIST Cybersecurity Framework

API-enabled Protection traffic is sent to which Netskope component?

A.

Netskope Publisher

B.

Netskope Management Plane

C.

Netskope Data Plane

D.

Netskope Reverse Proxy