Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Netskope NSK200 - Netskope Certified Cloud Security Integrator (NCCSI)

Page: 1 / 3
Total 93 questions

Review the exhibit.

You are troubleshooting a Netskope client for user Clarke which remains in a disabled state after being installed. After looking at various logs, you notice something which might explain the problem. The exhibit is an excerpt from the nsADImporterLog.log.

Referring to the exhibit, what is the problem?

A.

The client was not Installed with administrative privileges.

B.

The Active Directory user is not synchronized to the Netskope tenant.

C.

This is normal; it might take up to an hour to be enabled.

D.

The client traffic is decrypted by a network security device.

You are testing policies using the DLP predefined identifier "Card Numbers (Major Networks; all)." No DLP policy hits are observed.

A.

You must use Netskope API protection.

B.

Your data must have valid credit card numbers.

C.

You must normalize credit card numbers to 16-digit consecutive numbers.

D.

You must use the Netskope client to perform advanced DLP and optical character recognition.

You discover the ongoing use of the native Dropbox client in your organization. Although Dropbox is not a corporate-approved application, you do not want to prevent the use of Dropbox. You do, however, want to ensure visibility into its usage.

A.

Change Windows and Mac steering exception actions to use Tunnel mode and set Netskope as the source IP address for SSO services.

B.

Modify the existing tenant steering exception configuration to block the Dropbox native application to force users to use the Dropbox website.

C.

Remove all Dropbox entries from the tenant steering SSL configuration entirely.

D.

Create a new tenant steering exception type of Destination Locations that contains the Dropbox application.

With Netskope DLP, which feature would be used to detect keywords such as "Confidential" or "Access key"?

A.

Regular Expression

B.

Exact Match

C.

Fingerprint Classification

D.

Dictionary

Your customer implements Netskope Secure Web Gateway to secure all Web traffic. While they have created policies to block certain categories, there are many new sites available dally that are not yet categorized. The customer's users need quick access and cannot wait to put in a request to gain access requiring a policy change or have the site's category changed.

To solve this problem, which Netskope feature would provide quick, safe access to these types of sites?

A.

Netskope Cloud Firewall (CFW)

B.

Netskope Remote Browser Isolation (RBI)

C.

Netskope Continuous Security Assessment (CSA)

D.

Netskope SaaS Security Posture Management (SSPM)

Review the exhibit.

Your company uses Google as the corporate collaboration suite; however, corporate policy restricts the use of personal Google services. The exhibit provides a partially completed policy to ensure that users cannot log into their personal account.

What should be added to achieve the desired outcome in this scenario?

A.

Google Gmail app

B.

User Constraint

C.

DLP profile

D.

Device classification

An engineering firm is using Netskope DLP to identify and block sensitive documents, including schematics and drawings. Lately, they have identified that when these documents are blocked, certain employees may be taking screenshots and uploading them. They want to block any screenshots from being uploaded.

Which feature would you use to satisfy this requirement?

A.

exact data match (EDM)

B.

document fingerprinting

C.

ML image classifier

D.

optical character recognition (OCR)

You are using the Netskope DLP solution. You notice that valid credit card numbers in a file that you just uploaded to an unsanctioned cloud storage solution are not triggering a policy violation. You can see the Skope IT application events for this traffic but no DLP alerts.

Which statement is correct in this scenario?

A.

Netskope client is not enabled.

B.

You have set the severity threshold to a higher value.

C.

Netskope client is enabled, but API protection for the SaaS application is not configured.

D.

Credit card numbers are entered with a space or dash separator and not as a 16-digit consecutive number.

You are provisioning Netskope users from Okta with SCIM Provisioning, and users are not showing up in the tenant. In this scenario, which two Netskope components should you verify first In Okta for accuracy? (Choose two.)

A.

IdP Entity ID

B.

OAuth token

C.

Netskope SAML certificate

D.

SCIM server URL

You are deploying a Netskope client in your corporate office network. You are aware of firewall or proxy rules that need to be modified to allow traffic.

Which two statements are true in this scenario? (Choose two.)

A.

You need to allow TLS 1.1 traffic to pass through the firewalls from the users' IP to all destinations.

B.

You must enable SSL decryption in the proxy to inspect the Netskope tunnel.

C.

It is recommended to allow UDP port 443 to the Netskope IP ranges to allow DTLS.

D.

You need to allow TCP port 443 to the Netskope IP ranges or domains.