Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Netskope NSK200 - Netskope Certified Cloud Security Integrator (NCCSI)

Page: 3 / 3
Total 93 questions

While most Web and SaaS traffic is decrypted for inspection, you are asked to prevent a certain host on the network from SSL decryption for privacy purposes.

A.

Create a steering exception for the host.

B.

Create a Real-time Protection policy, select the host, and choose to block SSL decryption.

C.

Create a Source Network Location for a Do Not Decrypt SSL policy.

D.

Add the host to the certificate-pinned application list.

You are troubleshooting private application access from a user's computer. The user is complaining that they cannot access the corporate file share; however, the private tunnel seems to be established. You open the npadebuglog.log file in a text editor and cannot find any reference to the private application.

A.

The absence of npadebuglog.log entries is not significant.

B.

File shares cannot be published using private access.

C.

The user is not added to the required real-time policy.

D.

The user needs to re-authenticate for private applications.

Your customer is migrating all of their applications over to Microsoft 365 and Azure. They have good practices and policies in place (or their inline traffic, but they want to continuously detect reconfigurations and enforce compliance standards.

Which two solutions would satisfy their requirements? (Choose two.)

A.

Netskope SaaS Security Posture Management

B.

Netskope Cloud Confidence Index

C.

Netskope Risk Insights

D.

Netskope Continuous Security Assessment

A customer wants to use Netskope to prevent PCI data from leaving the corporate sanctioned OneDrive instance. In this scenario. which two solutions would assist in preventing data exfiltration? (Choose two.)

A.

API Data Protection

B.

Cloud Firewall (CFW)

C.

SaaS Security Posture Management (SSPM)

D.

Real-time Protection

Your company has a Symantec BlueCoat proxy on-premises and you want to deploy Netskope using proxy chaining. Which two prerequisites need to be enabled first in this scenario? (Choose two.)

A.

Disable SSL decryption.

B.

Disable the X-Authenticated-User header.

C.

Enable SSL decryption.

D.

Enable the X-Forwarded-For HTTP header

Review the exhibit.

Given the information shown below:

-for PCI data uploads, you want to provide no notification,

-for PHI data uploads, you want to allow users to proceed by clicking OK,

-for GDPR data uploads, you want to provide block notification,

-if none of the above matches, you want to provide no notification.

You want to reduce the number of policies by combining multiple DLP profiles Into one policy.

Referring to the exhibit, which two statements are true? (Choose two.)

A.

You must open a support ticket to enable the Advanced Policies feature.

B.

You must check the "set action for each profile" flag.

C.

You can have only one action if you use multiple DLP profiles in the same policy.

D.

You can apply a unique action to each profile In the same policy.

What is the purpose of the file hash list in Netskope?

A.

It configures blocklist and allowlist entries referenced in the custom Malware Detection profiles.

B.

It is used to allow and block URLs.

C.

It provides the file types that Netskope can inspect.

D.

It provides Client Threat Exploit Prevention (CTEP).