New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Netskope NSK300 - Netskope Certified Cloud Security Architect Exam

Page: 2 / 2
Total 68 questions

Users at your company's branch office in San Francisco report that their clients are connecting, but websites and SaaS applications are slow When troubleshooting, you notice that the users are connected to a Netskope data plane in New York where your company's headquarters is located.

What is a valid reason for this behavior?

A.

The Netskope Client's on-premises detection check failed.

B.

The Netskope Client's default DNS over HTTPS call is failing.

C.

The closest Netskope data plane to San Francisco is unavailable.

D.

The Netskope Client's DNS call to Secure Forwarder is failing

A company's architecture includes a server subnet that is logically isolated from the rest of the network with no Internet access, no default gateway, and no access to DNS. New resources can only be provisioned on virtual resources in that segment and there is a firewall that is tunnel-capable securing the perimeter of the segment. The only requirement is to have content filtering for any server that might access the Internet using a browser.

Which two Netskope deployment methods would achieve this requirement? (Choose two.)

A.

Deploy a mobile profile on the servers.

B.

Deploy Data Plane on Premises (DPoP) with a proxy configuration on the servers.

C.

Deploy IPsec or GRE tunnels in the segment to steer traffic from the servers to Netskope.

D.

Install the Netskope Client on the servers

Your company just had a new Netskope tenant provisioned and you are asked to create a secure tenant configuration. In this scenario, which two default settings should you change? {Choose two.)

A.

Change Safe Search to Disabled

B.

Change Untrusted Root Certificate to Block.

C.

Change the No SNI setting to Block.

D.

Change "Disallow concurrent logins by an Admin" to Enabled.

You have deployed Netskope to all users of the organization and you are now ready to begin ingesting all events, alerts, and Web transactions into your SIEM as a part of your requirements.

What are three ways in which you would accomplish this task? (Choose three.)

A.

Use custom API calls to ingest to a data lake and then into your SIEM.

B.

Use the Netskope Publisher to a stream syslog to your SIEM.

C.

Use syslog directly to Splunk.

D.

Use Cloud Log Shipper to an IaaS storage repository and then into your SIEM.

You are designing a Netskope deployment for a company with a mixture of endpoints, devices, and services.

In this scenario, what would be two considerations for using IPsec as part of the design? (Choose two.)

A.

guest Wi-Fi network users

B.

corporate-managed Mac computers

C.

remote unmanaged Windows PCs

D.

Internet-connected IoT devices

A company has deployed Explicit Proxy over Tunnel (EPoT) for their VDI users They have configured Forward Proxy authentication using Okta Universal Directory They have also configured a number of Real-time Protection policies that block access to different Web categories for different AD groups so. for example, marketing users are blocked from accessing gambling sites. During User Acceptance Testing, they see inconsistent results where sometimes marketing users are able to access gambling sites and sometimes they are blocked as expected They are seeing this inconsistency based on who logs into the VDI server first.

What is causing this behavior?

A.

Forward Proxy is not configured to use the Cookie Surrogate

B.

Forward Proxy is not configured to use the IP Surrogate

C.

Forward Proxy authentication is configured but not enabled.

D.

Forward Proxy is configured to use the Cookie Surrogate

You are the network architect for a company using Netskope Private Access. Multiple users are reporting that they are unable to access an application using Netskope Private Access that was working previously. You have verified that the Real-time Protection policy allows access to the application, private applications are steered for the users, and the application is reachable from internal machines. You must verify that the application is reachable through Netskope Publisher

In this scenario, which two tools in the Netskope Ul would you use to accomplish this task? (Choose two.)

A.

Reachability Via Publisher in the App Definitions page

B.

Troubleshooter tool in the App Definitions page

C.

Applications in Skope IT

D.

Clear Private App Auth under Users in Skope IT

Review the exhibit.

You are the proxy administrator for a medical devices company. You recently changed a pilot group of users from cloud app steering to all Web traffic. Pilot group users have started to report that they receive the error shown in the exhibit when attempting to access the company intranet site that is publicly available. During troubleshooting, you realize that this site uses your company's internal certificate authority for SSL certificates.

Which three statements describe ways to solve this issue? (Choose three.)

A.

Import the root certificate for your internal certificate authority into Netskope.

B.

Bypass SSL inspection for the affected site(s).

C.

Create a Real-time Protection policy to allow access.

D.

Change the SSL Error Settings from Block to Bypass in the Netskope tenant.

E.

Instruct the user to proceed past the error message

You jus! deployed and registered an NPA publisher for your first private application and need to provide access to this application for the Human Resources (HR) users group only. How would you accomplish this task?

A.

1. Enable private app steering in the Steering Configuration assigned to the HR group.

2. Create a new Private App.

3. Create a new Real-time Protection policy as follows;

Source = HR user group Destination = Private App Action = Allow

B.

1. Create a new private app and assign it to the HR user group.

2. Create a new Real-time Protection policy as follows:

Source = HR user group Destination = Private App Action = Allow.

C.

1. Enable private app steering in Tenant Steering Configuration.

2. Create a new private app and assign it to the HR user group.

D.

1. Enable private app steering in the Steering Configuration assigned to the HR group.

2. Create a new private app and assign it to the HR user group

3. Create a new Real-time Protection policy as follows:

Source = HR user group Destination = Private App Action = Allow

You have enabled CASB traffic steering using the Netskope Client, but have not yet enabled a Real-time Protection policy. What is the default behavior of the traffic in this scenario?

A.

Traffic will be blocked and logged.

B.

Traffic will be allowed and logged.

C.

Traffic will be blocked, but not logged.

D.

Traffic will be allowed, but not logged.