Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

NSK101 Sample Questions Answers

Questions 4

When would an administrator need to use a tombstone file?

Options:

A.

You use a tombstone file when a policy causes a file download to be blocked.

B.

You use a tombstone file when a policy causes a publicly shared file to be encrypted.

C.

You use a tombstone file when the policy causes a file to be moved to quarantine.

D.

You use a tombstone file when a policy causes a file to be moved to legal hold.

Buy Now
Questions 5

You determine that a business application uses non-standard HTTPS ports. You want to steer all HTTPS traffic for this application and have visibility and control over user activities.

Which action will allow you to accomplish this task?

Options:

A.

Create a steering exception for the application's domain and ports.

B.

Define a Private Agg for the application's domain and ports.

C.

Configure Non-standard ports in the Steering Configuration.

D.

Select All Traffic in the Steering Configuration.

Buy Now
Questions 6

Your department is asked to report on GDPR data publicly exposed in Microsoft 365, Salesforce. and Slack-sanctioned cloud applications. Which deployment model would you use to discover this data?

Options:

A.

reverse proxy

B.

on-premises appliance

C.

API-enabled protection

D.

inline protection

Buy Now
Questions 7

Which three components make up the Borderless SD-WAN solution? (Choose three)

Options:

A.

Endpoint SD-WAN Client

B.

SASE Orchestrator

C.

NPA Publisher

D.

SASE Gateway

E.

On-Premises Log Parser

Buy Now
Questions 8

You consume application infrastructure (middleware) capabilities by a third-party provider. What is the cloud service model that you are using in this scenario?

Options:

A.

PaaS

B.

MaaS

C.

DaaS

D.

SaaS

Buy Now
Questions 9

What is the limitation of using a legacy proxy compared to Netskope's solution?

Options:

A.

Netskope architecture requires on-premises components.

B.

Legacy solutions offer higher performance and scalability for corporate and remote users.

C.

Legacy on-premises solutions fail to provide protection for traffic from on-premises users.

D.

To enforce policies, traffic needs to traverse back through a customer's on-premises security stack.

Buy Now
Questions 10

You are attempting to allow access to an application using NPA. Private Apps steering is already enabled for all users.

In this scenario, which two actions are required to accomplish this task? (Choose two.)

Options:

A.

Disable Cloud & Firewall Apps in Steering Config.

B.

Create a Real-time Protection "Allow" policy for the Private App.

C.

Create a Private App.

D.

Ensure that SSO is in place.

Buy Now
Questions 11

You are required to provide an additional pop-up warning to users before allowing them to proceed to Web applications categorized as "low" or "poor" by Netskope's Cloud Confidence Index. Which action would allow you to accomplish this task?

Options:

A.

Enable RBI on the uncategorized domains

B.

Create a policy limiting usage of generative AI.

C.

Redirect the user to the company banner page for the Web usage policy.

D.

Enable real-time user coaching based on CCL.

Buy Now
Questions 12

Which two capabilities are part of Netskope's Adaptive Zero Trust Data Protection? (Choose two.)

Options:

A.

contextual risk awareness

B.

continuous adaptive policies

C.

continuous enforcement of all policies

D.

contextual metadata storage

Buy Now
Questions 13

Which two statements are correct about Netskope’s NewEdge Security Cloud Network Infrastructure? (Choose two.)

Options:

A.

It utilizes virtual POPs for traffic onboarding ensuring low latency.

B.

It includes direct peering with Microsoft and Google in every data center.

C.

It is a private security cloud network that is over-provisioned, elastic, and built for scale.

D.

It utilizes multiple public cloud providers for inline services ensuring high availability and elasticity.

Buy Now
Questions 14

What are two supported ways to provision users to your customer's Netskope tenant? (Choose two.)

Options:

A.

Use Microsoft Intune.

B.

Use the AD Connector.

C.

Use SCIM.

D.

Use the Directory Importer.

Buy Now
Questions 15

A new customer is concerned about performance, especially with respect to Microsoft 365. They have offices in 20 countries around the world and their workforce is mostly mobile.

In this scenario, which two statements about NewEdge would align with the customer's requirements? (Choose two.)

Options:

A.

NewEdge accurately identifies Microsoft 365 violations and data risks.

B.

NewEdge provides advanced public cloud infrastructure security.

C.

NewEdge provides direct peering with Microsoft in every data center.

D.

NewEdge delivers a single, unified network with all services available in all locations worldwide.

Buy Now
Questions 16

You have an issue with the Netskope client connecting to the tenant.

In this scenario, what are two ways to collect the logs from the client machine? (Choose two.)

Options:

A.

from the Netskope client Ul About page

B.

from the command line using the nsdiag command

C.

from the Netskope client system tray icon

D.

from the Netskope client Ul Configuration page

Buy Now
Questions 17

What are two benefits of creating a policy group as a logical collection of Real-time Protection policies? (Choose two.)

Options:

A.

To split up policies by region or business unit.

B.

To enable Alert and Continue policies.

C.

To simplify workflow, allowing exact access to a specific set of policies.

D.

To provide additional actions based on policy match criteria.

Buy Now
Questions 18

What are two uses for deploying a Netskope Virtual Appliance? (Choose two.)

Options:

A.

to use as a log parser to discover in-use cloud applications

B.

to use as a local reverse proxy to secure a SaaS application

C.

to use as an endpoint for Netskope Private Access (NPA)

D.

to use as a secure way to generate Exact Data Match hashes

Buy Now
Questions 19

You are required to create a policy that will notify and allow users to log into their personal Google Drive instance.

Which two policy components must be configured to enforce this use case? (Choose two.)

Options:

A.

Storage Constraint Profile

B.

Steering Exception

C.

User Alert

D.

User Constraint Profile

Buy Now
Questions 20

In which two scenarios would you use SD-WAN technology? (Choose two.)

Options:

A.

to differentiate between corporate and personal SaaS applications

B.

to optimize utilization and performance across multiple Internet connections

C.

to ensure a user's corporate laptop has all of the required security compliance software in place

D.

to replace dedicated MPLS connections with multiple broadband WAN and mobile options

Buy Now
Questions 21

When designing an architecture with Netskope Private Access, which element guarantees connectivity between the Netskope cloud and the private application?

Options:

A.

Netskope Publisher

B.

API connector

C.

Third-party router with GRE/IPsec support

D.

Netskope Client

Buy Now
Questions 22

Click the Exhibit button.

A user has the Netskope Client enabled with the correct steering configuration applied. The exhibit shows an inline policy that has a predefined webmail category blocked. However the user is still able to access Yahoo mail.

Which statement is correct in this scenario?

Options:

A.

The user is not part of the correct AD group or OU.

B.

The user is not steered using an explicit proxy.

C.

The webmail category does not include Yahoo mail when using an explicit proxy

D.

The user's AD group must be added to the policy.

Buy Now
Questions 23

When accessing an encrypted website (HTTPS), what is a reason why you might receive a "certificate not trusted" browser message?

Options:

A.

A certificate authority is installed on the server.

B.

A self-signed certificate is installed on the server.

C.

A public certificate is installed on the server.

D.

There is no certificate installed on the server.

Buy Now
Questions 24

Which two statements describe a website categorized as a domain generated algorithm (DGA)? (Choose two.)

Options:

A.

The website is used for domain registration.

B.

The domain contains malicious algorithms.

C.

The website is used to hide a command-and-control server.

D.

The domain was created by a program.

Buy Now
Questions 25

How do you protect your data at rest intellectual property (IP), such as source code or product designs, stored in Microsoft 365 SharePoint?

Options:

A.

by configuring Netskope Explicit Proxy in the user's browser

B.

by steering SharePoint traffic over GRE or IPsec to a Netskope cloud proxy

C.

by using Netskope's API-enabled Protection for SharePoint

D.

by steering SharePoint traffic using the Netskope Client

Buy Now
Questions 26

Which statement is correct about Netskope's Instance Awareness?

Options:

A.

It prevents users from browsing the Internet using outdated Microsoft Internet Explorer but allows them access if they use the latest version of Microsoft Edge.

B.

It identifies that a form hosted in Microsoft Forms belongs to the corporate Microsoft 365 tenant and not a tenant from a third party.

C.

It differentiates personal code from work-related code being uploaded to GitHub.

D.

It identifies if e-mails are being sent using Microsoft 365 through Outlook, Thunderbird, or the Web application in outlook.com.

Buy Now
Questions 27

Click the Exhibit button.

Referring to the exhibit, you have a user reporting that a blocked website is needed for legitimate business reasons. Upon review, you determine that the user has been blocked by the Global Block policy. You need to create an exception forthat domain. You create a custom URL list that includes the domain.

In this scenario, which two actions would allow this access? (Choose two.)

Options:

A.

Create a custom category with the custom URL list as an included URL list and add it to an allow policy below the triggered Global Block policy.

B.

Create a custom category with the custom URL list as an included URL list and add it to an allow policy above the triggered Global Block policy.

C.

Add the custom URL list as an excluded URL list to the category in the Global Allow policy.

D.

Add the custom URL list as an excluded URL list to the category in the Global Block policy.

Buy Now
Questions 28

Click the Exhibit button.

The exhibit shows security rules that are part of which component of the Netskope platform?

Options:

A.

Real-time Protection

B.

Advanced Malware Protection

C.

Security Posture

D.

Behavior Analytics

Buy Now
Questions 29

All users are going through Netskope's Next Gen SWG. Your CISO requests a monthly report of all users who are accessing cloud applications with a "Low" or a "Poor" CCL, where the activity is either "Edit" or "Upload".

Using the Advanced Analytics interface, which two statements describe which actions must be performed in this scenario? (Choose two.)

Options:

A.

Create a report using the Data Collection "Page Events", filtering on the activities "Edit" and "Upload" for cloud apps with CCL values of "Low" or "Poor".

B.

Schedule a report with a monthly recurrence to be sent by e-mail with the attached PDF document at the end of each month.

C.

Create a report using the Data Collection "Application Events" filtering on the activities "Edit" and "Upload" for cloud apps with CCL values of "Low" or "Poor".

D.

Schedule a report with a monthly recurrence to be sent by SMS with the attached PDF document at the end of each month.

Buy Now
Questions 30

You want to use an out-of-band API connection into your sanctioned Microsoft 365 OneDrive for Business application to find sensitive content, enforce near real-time policy controls, and quarantine malware.

In this scenario, which primary function in the Netskope platform would you use to connect your application to Netskope?

Options:

A.

DLP forensics

B.

Risk Insights

C.

laaS API-enabled Protection

D.

SaaS API-enabled Protection

Buy Now
Questions 31

Which three security controls are offered by the Netskope Cloud platform? (Choose three.)

Options:

A.

identity lifecycle management

B.

data loss prevention for SMTP

C.

cloud security posture management

D.

endpoint anti-malware

E.

threat protection

Buy Now
Questions 32

Which two common security frameworks are used today to assess and validate a vendor's security practices? (Choose two.)

Options:

A.

Data Science Council of America

B.

Building Security in Maturity Model

C.

ISO 27001

D.

NIST Cybersecurity Framework

Buy Now
Questions 33

You are required to mitigate malicious scripts from being downloaded into your corporate devices every time a user goes to a website. Users need to access websites from a variety of categories, including new websites.

Which two actions would help you accomplish this task while allowing the user to work? (Choose two.)

Options:

A.

Allow the user to browse uncategorized domains but restrict edit activities.

B.

Block malware detected on download activity for all remaining categories.

C.

Block known bad websites and enable RBI to uncategorized domains.

D.

Allow a limited amount of domains and block everything else.

Buy Now
Questions 34

You need to locate events for specific activities such as "edit" or "login successful" in a cloud application.

In which SkopeIT Events & Alerts page would this information be found?

Options:

A.

Endpoint Events

B.

Page Events

C.

Application Events

D.

Websites

Buy Now
Questions 35

Which two functions are available for both inline and API protection? (Choose two.)

Options:

A.

multi-factor authentication

B.

threat protection

C.

DLP

D.

Cloud Security Posture Management (CSPM)

Buy Now
Questions 36

Which Netskope platform component uses NewEdge Traffic Management for traffic steering?

Options:

A.

Cloud Exchange

B.

Client

C.

Data Plane On-Premises

D.

Explicit Proxy Over Tunnel

Buy Now
Questions 37

Your customer asks you to secure all Web traffic as part of the initial configuration. In the Netskope platform, which statement is correct in this scenario?

Options:

A.

Add the all Web traffic option to the steering configuration.

B.

Netskope automatically steers all Web traffic.

C.

Netskope cannot steer Web traffic.

D.

Select all Web traffic in the SSL decryption section.

Buy Now
Questions 38

What is a benefit that Netskope instance awareness provides?

Options:

A.

It prevents movement of corporate sensitive data to a personal Dropbox account.

B.

It prevents the user from copying information from a corporate email and pasting the information into a GitHub repository.

C.

It differentiates between an IT managed Google Drive instance versus a personal Dropbox account.

D.

It differentiates between an IT managed Google Drive instance versus a personal Google Drive instance.

Buy Now
Exam Code: NSK101
Exam Name: Netskope Certified Cloud Security Administrator (NCCSA)
Last Update: Nov 17, 2024
Questions: 129
$64  $159.99
$48  $119.99
$40  $99.99
buy now NSK101