Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Netskope NSK300 - Netskope Certified Cloud Security Architect Exam

Page: 2 / 2
Total 60 questions

A company's architecture includes a server subnet that is logically isolated from the rest of the network with no Internet access, no default gateway, and no access to DNS. New resources can only be provisioned on virtual resources in that segment and there is a firewall that is tunnel-capable securing the perimeter of the segment. The only requirement is to have content filtering for any server that might access the Internet using a browser.

Which two Netskope deployment methods would achieve this requirement? (Choose two.)

A.

Deploy a mobile profile on the servers.

B.

Deploy Data Plane on Premises (DPoP)with a proxy configuration on the servers.

C.

Deploy IPsec or GRE tunnels in the segment to steer traffic from the servers to Netskope.

D.

Install the Netskope Client on the servers

Review the exhibit.

You created an SSL decryption policy to bypass the inspection of financial and accounting Web categories. However, you still see banking websites being inspected.

Referring to the exhibit, what are two possible causes of this behavior? (Choose two.)

A.

The policy is in a "disabled" state.

B.

An incorrect category has been selected

C.

The policy is in a "pending changes" state.

D.

An incorrect action has been specified.

A company needs to block access to their instance of Microsoft 365 from unmanaged devices. They have configured Reverse Proxy and have also created a policy that blocks login activity for the AD group "marketing-users" for theReverse Proxy access method. During UAT testing, they notice that access from unmanaged devices to Microsoft 365 is not blocked for marketing users.

What is causing this issue?

A.

There is a missing group name in the SAML response.

B.

The username in the name ID field is not in the format of the e-mail address.

C.

There is an invalid certificate in the SAML response.

D.

The username in the name ID field does not have the "marketing-users" group name.

You are troubleshooting an issue with users who are unable to reach a financial SaaS application when their traffic passes through Netskope. You determine that this is because of IP restrictions in place with the SaaS vendor. You are unable to add Netskope's IP ranges at this time, but need to allow the traffic.

How would you allow this traffic?

A.

Use NPAto implement Source IP anchonng so the traffic will egress from the corporate data center.

B.

Use Explicit Proxy Over Tunnel (EPoT) so the traffic will egress from the corporate data center.

C.

Use Cloud Explicit Proxy so the traffic will egress from the corporate data center

D.

Use an IPsec tunnel to forward traffic so it will egress from the corporate data center

You want to verify that Google Drive is being tunneled to Netskope by looking in the nsdebuglog file. You are using Chrome and the Netskope Client to steer traffic. In this scenario, what would you expect to see in the log file?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

A company has deployed Explicit Proxy over Tunnel (EPoT) for their VDI users They have configured Forward Proxy authentication using Okta Universal Directory They have also configured a number of Real-time Protection policies that blockaccess to different Web categories for different AD groups so. for example, marketing users are blocked from accessing gambling sites. During User Acceptance Testing, they see inconsistent results where sometimes marketing users are able to access gambling sites and sometimes they are blocked as expected They are seeing this inconsistency based on who logs into the VDI server first.

What is causing this behavior?

A.

Forward Proxy is not configured to use the Cookie Surrogate

B.

Forward Proxy is not configured to use the IP Surrogate

C.

Forward Proxy authentication is configured but not enabled.

D.

Forward Proxy is configured to use the Cookie Surrogate

Your CISO asks that you to provide a report with a visual representation of the top 10 applications (by number of objects) and their risk score. As the administrator, you decide to use a Sankey visualization in Advanced Analytics to represent the data in an efficient manner.

In this scenario, which two field types are required to produce a Sankey Tile in your report? {Choose two.)

A.

Dimension

B.

Measure

C.

Pivot Ranks

D.

Period of Type

You successfully configured Advanced Analytics to identify policy violation trends Upon further investigation, you notice that the activity is NULL. Why is this happening in this scenario?

A.

The SSPM policy was not configured during setup.

B.

The REST API v1 token has expired.

C.

A policy violation was identified using API Protection.

D.

A user accessed a static Web page.