Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Netskope NSK100 Netskope Certified Cloud Security Administrator Exam Exam Practice Test

Demo: 18 questions
Total 60 questions

Netskope Certified Cloud Security Administrator Exam Questions and Answers

Question 1

In which scenario would you use a SAML reverse proxy?

Options:

A.

When the API-enabled protection exceeds the Cloud App API usage limits and cannot be used anymore.

B.

When the organization wants to perform inline inspection of cloud application traffic for roaming users that do not have the Netskope agent installed.

C.

When there are multiple SAML IdPs in use and the SAML reverse proxy can help federate them all together.

D.

When PAC files or explicit proxies can be used to steer traffic to the Netskope platform.

Question 2

What are two fundamental differences between the inline and API implementation of the Netskope platform? (Choose two.)

Options:

A.

The API implementation can be used with both sanctioned and unsanctioned applications.

B.

The API implementation can only be used with sanctioned applications.

C.

The inline implementation can effectively block a transaction in both sanctioned and unsanctioned applications.

D.

The inline implementation can only effectively block a transaction in sanctioned applications.

Question 3

According to Netskope. what are two preferred methods to report a URL miscategorization? (Choose two.)

Options:

A.

Use www.netskope.com/url-lookup.

B.

Use the URL Lookup page in the dashboard.

C.

Email support@netskope.com.

D.

Tag Netskope on Twitter.

Question 4

You want to deploy Netskope's zero trust network access (ZTNA) solution, NPA. In this scenario, which action would you perform to accomplish this task?

Options:

A.

Create an OAuth identity access control between your users and your applications.

B.

Set up a reverse proxy using SAML and an identity provider.

C.

Enable Steer all Private Apps in your existing steering configuration(s) from the admin console.

D.

Configure SCIM to exchange identity information and attributes with your applications.

Question 5

When would an administrator need to use a tombstone file?

Options:

A.

You use a tombstone file when a policy causes a file download to be blocked.

B.

You use a tombstone file when a policy causes a publicly shared file to be encrypted.

C.

You use a tombstone file when the policy causes a file to be moved to quarantine.

D.

You use a tombstone file when a policy causes a file to be moved to legal hold.

Question 6

What are two characteristics ofNetskope's Private Access Solution? (Choose two.)

Options:

A.

It provides protection for private applications.

B.

It provides access to private applications.

C.

It acts as a cloud-based firewall.

D.

It requires on-premises hardware.

Question 7

You are required to mitigate malicious scripts from being downloaded into your corporate devices every time a user goes to a website. Users need to access websites from a variety of categories, including new websites.

Which two actions would help you accomplish this task while allowing the user to work? (Choose two.)

Options:

A.

Allow the user to browse uncategorized domains but restrict edit activities.

B.

Block malware detected on download activity for all remaining categories.

C.

Block known bad websites and enable RBI to uncategorized domains.

D.

Allow a limited amount of domains and block everything else.

Question 8

What are two use cases for Netskope's DLP solution? (Choose two.)

Options:

A.

to stop unintentional data movement

B.

to detect malware in files before they are uploaded to a cloud application

C.

to detect sensitive data in password protected files

D.

to ensure regulatory compliance

Question 9

A customer wants to detect misconfigurations in their AWS cloud instances.

In this scenario, which Netskope feature would you recommend to the customer?

Options:

A.

Netskope Secure Web Gateway (SWG)

B.

Netskope Cloud Security Posture Management (CSPM)

C.

Netskope Advanced DLP and Threat Protection

D.

Netskope SaaS Security Posture Management (SSPM)

Question 10

Which two common security frameworks are used today to assess and validate a vendor's security practices? (Choose two.)

Options:

A.

Data Science Council of America

B.

Building Security in Maturity Model

C.

ISO 27001

D.

NIST Cybersecurity Framework

Question 11

You need to provide a quick view under the Skope IT Applications page showing only risky shadow IT cloud applications being used.

In this scenario, which two filter combinations would you use to accomplish this task? (Choose two.)

Options:

A.

Sanctioned = No

B.

CCL = High. Under Research

C.

User Device Type = Windows Device

D.

CCL = Medium. Low, Poor

Question 12

Which two statements are correct about DLP Incidents in the Netskope platform? (Choose two.)

Options:

A.

An incident can be associated to one or more DLP policies.

B.

An incident can have one or more DLP violations.

C.

An incident can be assigned to one or more administrators.

D.

An incident can be associated to one or more DLP rules.

Question 13

What is a benefit that Netskope instance awareness provides?

Options:

A.

It prevents movement of corporate sensitive data to a personal Dropbox account.

B.

It prevents the user from copying information from a corporate email and pasting the information into a GitHub repository.

C.

It differentiates between an IT managed Google Drive instance versus a personal Dropbox account.

D.

It differentiates between an IT managed Google Drive instance versus a personal Google Drive instance.

Question 14

You are working with a large retail chain and have concerns about their customer data. You want to protect customer credit card data so that it is never exposed in transit or at rest. In this scenario, which regulatory compliance standard should be used to govern this data?

Options:

A.

SOC 3

B.

PCI-DSS

C.

AES-256

D.

ISO 27001

Question 15

Which two statements describe a website categorized as a domain generated algorithm (DGA)? (Choose two.)

Options:

A.

The website is used for domain registration.

B.

The domain contains malicious algorithms.

C.

The website is used to hide a command-and-control server.

D.

The domain was created by a program.

Question 16

What correctly defines the Zero Trust security model?

Options:

A.

least privilege access

B.

multi-layered security

C.

strong authentication

D.

double encryption

Question 17

You need to create a service request ticket for a client-related issue using the Netskope client Ul. In this scenario, you generate the client logs by right-clicking on the system tray icon and choosing

Options:

A.

Save logs

B.

Configuration

C.

Troubleshoot

D.

Help

Question 18

A company is attempting to steer traffic to Netskope using GRE tunnels. They notice that after the initial configuration, users cannot access external websites from their browsers.

What are three probable causes for this issue? (Choose three.)

Options:

A.

The pre-shared key for the GRE tunnel is incorrect.

B.

The configured GRE peer in the Netskope platform is incorrect.

C.

The corporate firewall might be blocking GRE traffic.

D.

The route map was applied to the wrong router interface.

E.

Netskope does not support GRE tunnels.

Demo: 18 questions
Total 60 questions