Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Netskope NSK200 - Netskope Certified Cloud Security Integrator (NCCSI)

Page: 2 / 3
Total 93 questions

You are troubleshooting an issue with Microsoft where some users complain about an issue accessing OneDrive and SharePoint Online. The configuration has the Netskope client deployed and active for most users, but some Linux machines are routed to Netskope using GRE tunnels. You need to disable inspection for all users to begin troubleshooting the issue.

In this scenario, how would you accomplish this task?

A.

Create a Real-time Protection policy to isolate Microsoft 365.

B.

Create a Do Not Decrypt SSL policy for the Microsoft 365 App Suite.

C.

Create a steering exception for the Microsoft 365 domains.

D.

Create a Do Not Decrypt SSL policy for OneDrive.

You are an administrator writing Netskope Real-time Protection policies and must determine proper policy ordering.

Which two statements are true in this scenario? (Choose two.)

A.

You must place DLP policies at the bottom.

B.

You do not need to create an "allow all" Web Access policy at the bottom.

C.

You must place Netskope private access malware policies in the middle.

D.

You must place high-risk block policies at the top.

Your customer is concerned about malware in their AWS S3 buckets. What two actions would help with this scenario? (Choose two.)

A.

Create a real-time policy to block malware uploads to their AWS instances.

B.

Enable Threat Protection (Malware Scan) for all of their AWS instances to Identify malware.

C.

Create an API protection policy to quarantine malware in their AWS S3 buckets.

D.

Create a threat profile to quarantine malware in their AWS S3 buckets.

Your company asks you to use Netskope to integrate with Endpoint Detection and Response (EDR) vendors such as CrowdStrike. In this scenario, what is a requirement for a successful Integration and sharing of threat data?

A.

API Client ID

B.

device classification

C.

custom log parser

D.

user endpoint

You want to provide malware protection for all cloud storage applications.

In this scenario, which action would accomplish this task?

A.

Create a real-time threat protection policy with a category of Cloud Storage.

B.

Apply a data protection profile.

C.

Apply a CTEP profile.

D.

Create an API threat protection policy with a category of Cloud Storage.

You are currently migrating users away from a legacy proxy to the Netskope client in the company’s corporate offices. You have deployed the client to a pilot group; however, when the client attempts to connect to Netskope, it fails to establish a tunnel.

In this scenario, what would cause this problem?

A.

The legacy proxy is intercepting SSL/TLS traffic to Netskope.

B.

The corporate firewall is blocking UDP port 443 to Netskope.

C.

The corporate firewall is blocking the Netskope EPoT address.

D.

The client cannot reach dns.google for EDNS resolution.

Your organization has three main locations with 30.000 hosts in each location. You are planning to deploy Netskope using iPsec tunnels for security.

What are two considerations to make a successful connection in this scenario? (Choose two.)

A.

browsers in use

B.

operating systems

C.

redundant POPs

D.

number of hosts

Review the exhibit.

You are asked to create a DLP profile that will ensure that the data shown in the exhibit cannot be uploaded to a user's personal Google Drive.

What must be used to accomplish this task?

A.

document fingerprinting

B.

ML image classifier

C.

optical character recognition

D.

INTL-PAN-Name rule

Review the exhibit.

You are asked to restrict users from accessing YouTube content tagged as Sport. You created the required real-time policy; however, users can still access the content

Referring to the exhibit, what is the problem?

A.

The website is in a steering policy exception.

B.

The policy changes have not been applied.

C.

The YouTube content cannot be controlled.

D.

The traffic matched a Do Not Decrypt policy

You have deployed a development Web server on a public hosting service using self-signed SSL certificates. After some troubleshooting, you determined that when the Netskope client is enabled, you are unable to access the Web server over SSL. The default Netskope tenant steering configuration is in place.

In this scenario, which two settings are causing this behavior? (Choose two.)

A.

SSL pinned certificates are blocked.

B.

Untrusted root certificates are blocked.

C.

Incomplete certificate trust chains are blocked.

D.

Self-signed server certificates are blocked.