New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Netskope NSK300 - Netskope Certified Cloud Security Architect Exam

Page: 1 / 2
Total 68 questions

What is a Fast Scan component of Netskope Threat Detection?

A.

Heuristic Analysis

B.

Machine Learning

C.

Dynamic Analysis

D.

Statical Analysis

You do not want a scheduled Advanced Analytics dashboard to be automatically updated when Netskope makes improvements to that dashboard. In this scenario, what would you do to retain the original dashboard?

A.

Create a new dashboard from scratch that mimics the Netskope dashboard you want to use.

B.

Copy the dashboard into your Group or Personal folders and schedule from these folders.

C.

Ask Netskope Support to provide the dashboard and import into your Personal folder.

D.

Download the dashboard you want and Import from File into your Group or Personal folder.

You are implementing Netskope Cloud Exchange in your company lo include functionality provided by third-party partners. What would be a reason for using Netskope Cloud Risk Exchange in this scenario?

A.

to ingest events and alerts from a Netskope tenant

B.

to feed SOC with detection and response services

C.

to map multiple scores to a normalized range

D.

to automate service tickets from alerts of interest

You want to enable the Netskope Client to automatically determine whether it is on-premises or off-premises. Which two options in the Netskope Ul would you use to accomplish this task? (Choose two.)

A.

the All Traffic option in the Steering Configuration section of the Ul

B.

the New Exception option in the Traffic Steering options of the Ul

C.

the Enable Dynamic Steering option in the Steering Configuration section of the Ul

D.

the On Premises Detection option under the Client Configuration section of the Ul

You want to see all instances of malware that were detected by the Netskope Cloud Sandbox.

Which process would you use to achieve this task in the Netskope tenant UI?

A.

Go to Incidents > Malicious Sites, and perform the detection_engine eq ‘Advanced Detection’ query.

B.

Go to Incidents > Malware and perform the detection_engine eq ‘Netskope Cloud Sandbox’ query.

C.

Go to Skope IT > Alerts, switch to Query Mode and perform the detection_engine eq ‘Netskope Cloud Sandbox’ query.

D.

Go to Skope IT > Page Events, switch to Query Mode and perform the detection_engine eq ‘Netskope Cloud Sandbox’ query.

Users in your network are attempting to reach a website that has a self-signed certificate using a GRE tunnel to Netskope. They are currently being blocked by Netskope with an SSL error. How would you allow this traffic?

A.

Configure a Do Not Decrypt SSL Decryption rule to allow traffic to pass.

B.

Configure a Real-time Protection policy with the action set to Allow.

C.

Set the No SNI setting in Netskope to Bypass.

D.

Ensure that the users add the self-signed certificate to their local certificate store.

You are attempting to merge two Advanced Analytics reports with DLP incidents: Report A with 3000 rows and Report B with 6000 rows. Once merged, you notice that the merged report is missing a significant number of rows.

What is causing this behavior?

A.

Netskope automatically deduplicates data in merged reports.

B.

Missing data is due to viewing limits.

C.

Filters are applied differently to dimensions and measures

D.

Visualizations have a system limit of 5000 rows.

You recently began deploying Netskope at your company. You are steering all traffic, but you discover that the Real-time Protection policies you created to protect Microsoft OneDrive are not being enforced.

Which default setting in the Ul would you change to solve this problem?

A.

Disable the default Microsoft appsuite SSL rule.

B.

Disable the default certificate-pinned application

C.

Remove the default steering exception for domains.

D.

Remove the default steering exception for Cloud Storage.

You are troubleshooting an issue with users who are unable to reach a financial SaaS application when their traffic passes through Netskope. You determine that this is because of IP restrictions in place with the SaaS vendor. You are unable to add Netskope's IP ranges at this time, but need to allow the traffic.

How would you allow this traffic?

A.

Use NPAto implement Source IP anchonng so the traffic will egress from the corporate data center.

B.

Use Explicit Proxy Over Tunnel (EPoT) so the traffic will egress from the corporate data center.

C.

Use Cloud Explicit Proxy so the traffic will egress from the corporate data center

D.

Use an IPsec tunnel to forward traffic so it will egress from the corporate data center

You successfully configured Advanced Analytics to identify policy violation trends Upon further investigation, you notice that the activity is NULL. Why is this happening in this scenario?

A.

The SSPM policy was not configured during setup.

B.

The REST API v1 token has expired.

C.

A policy violation was identified using API Protection.

D.

A user accessed a static Web page.