11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

NSK101 Exam Dumps - Netskope Certified Cloud Security Administrator (NCCSA)

Question # 4

You are required to create a policy that will notify and allow users to log into their personal Google Drive instance.

Which two policy components must be configured to enforce this use case? (Choose two.)

A.

Storage Constraint Profile

B.

Steering Exception

C.

User Alert

D.

User Constraint Profile

Full Access
Question # 5

Your company started deploying the latest version of the Netskope Client and you want to track the progress and device count using Netskope.

Which two statements are correct in this scenario? (Choose two.)

A.

Use Netskope Digital Experience Management to monitor the status.

B.

Use the Devices page under Settings to view and filter the required data.

C.

Review the Group definitions under Settings to determine the number of deployed clients.

D.

Review the Steering Configuration to determine the number of deployed clients.

Full Access
Question # 6

Click the Exhibit button.

What are two use cases where the parameter shown in the exhibit is required? (Choose two.)

A.

When you create a policy to prevent file transfer between a sanctioned Google Drive and personal Google Drive.

B.

When you share the JoC between a third-party security solution and the Threat Protection Profile.

C.

When you create a policy to prevent binary files larger than 5 MB that are shared publicly on a sanctioned OneDrive.

D.

When you share Incident details about files detected in a DLP incident.

Full Access
Question # 7

Which networking function does a SASE solution provide above and beyond an SSE solution?

A.

Secure Web Gateway

B.

Cloud Access Security Broker

C.

Data Loss Prevention

D.

Software Defined Wide Area Network

Full Access
Question # 8

Digital Experience Management (DEM) allows an administrator to monitor which two areas? (Choose two.)

A.

User activities

B.

Bandwidth consumption

C.

Information on triggered policies

D.

Client steering data

Full Access
Question # 9

Which two traffic steering configurations are supported by Netskope? (Choose two.)

A.

browser isolation traffic only

B.

cloud applications only

C.

all Web traffic including cloud applications

D.

Web traffic only

Full Access
Question # 10

You are asked to review files affected by malware in your organization. In this scenario, which two actions are possible and would be accessible from the Netskope UI -> Incidents --> Malware? (Choose two)

A.

Download the original malware file generating the alert to be analyzed by the SOC team

B.

Identify the exposure of the file identified as malware.

C.

Remediate the compromised devices.

D.

Determine the Detection Engine used to identify the malware.

Full Access
Question # 11

All users are going through Netskope's Next Gen SWG. Your CISO requests a monthly report of all users who are accessing cloud applications with a "Low" or a "Poor" CCL, where the activity is either "Edit" or "Upload".

Using the Advanced Analytics interface, which two statements describe which actions must be performed in this scenario? (Choose two.)

A.

Create a report using the Data Collection "Page Events", filtering on the activities "Edit" and "Upload" for cloud apps with CCL values of "Low" or "Poor".

B.

Schedule a report with a monthly recurrence to be sent by e-mail with the attached PDF document at the end of each month.

C.

Create a report using the Data Collection "Application Events" filtering on the activities "Edit" and "Upload" for cloud apps with CCL values of "Low" or "Poor".

D.

Schedule a report with a monthly recurrence to be sent by SMS with the attached PDF document at the end of each month.

Full Access
Question # 12

You want to deploy Netskope's zero trust network access (ZTNA) solution, NPA. In this scenario, which action would you perform to accomplish this task?

A.

Create an OAuth identity access control between your users and your applications.

B.

Set up a reverse proxy using SAML and an identity provider.

C.

Enable Steer all Private Apps in your existing steering configuration(s) from the admin console.

D.

Configure SCIM to exchange identity information and attributes with your applications.

Full Access
Question # 13

You added a new private app definition and created a Real-time Protection policy to allow access for all users. You have a user who reports that they are unable to access the application but all other applications work fine.

Which statement correctly describes how to troubleshoot this issue using the Netskope Web UI?

A.

You can verity the user's policy, steering configuration, client status and other relevant details using the Advanced Debugging tools in the Netskoge Client.

B.

You can verify the user's policy, steering configuration, client status and other relevant details using the Agg Discovery dashboard.

C.

You can verify the user's policy, steering configuration, client status and other relevant details using DEM.

D.

You can verify the user's policy, steering configuration, client status and other relevant details using the NPA Troubleshooter took

Full Access
Question # 14

What are two fundamental differences between the inline and API implementation of the Netskope platform? (Choose two.)

A.

The API implementation can be used with both sanctioned and unsanctioned applications.

B.

The API implementation can only be used with sanctioned applications.

C.

The inline implementation can effectively block a transaction in both sanctioned and unsanctioned applications.

D.

The inline implementation can only effectively block a transaction in sanctioned applications.

Full Access
Question # 15

You want to block access to sites that use self-signed certificates. Which statement is true in this scenario?

A.

Certificate-related settings apply globally to the entire customer tenant.

B.

Certificate-related settings apply to each individual steering configuration level.

C.

Certificate-related settings apply to each individual client configuration level.

D.

Self-signed certificates must be changed to a publicly trusted CA signed certificate.

Full Access
Question # 16

Click the Exhibit button.

A user is uploading a file containing PCI-DSS data to the corporate Google Drive instance. You notice that the upload is not blocked by the policy shown in the exhibit. Which statement is correct in this scenario?

A.

The policy is not applied to the correct user group.

B.

The policy is not applied to the correct URL category.

C.

The policy is not applied in the correct order.

D.

The policy is not applied to the correct application activity.

Full Access
Question # 17

You are required to present a view of all upload activities completed by users tunneled from the Los Angeles office to cloud storage applications.

Which two basic filters would you use on the SkopeIT Applications page to satisfy this requirement? (Choose two.)

A.

Activity

B.

Access Method

C.

Action

D.

CCL

Full Access
Question # 18

You want to determine which NewEdge data planes that your remote users have been recently using.

Which area of the Netskope Tenant UI would provide this information?

A.

Client Steering under Digital Experience Management

B.

Network Steering under Digital Experience Management

C.

Users page under Settings

D.

Devices page under Settings

Full Access
Question # 19

As an administrator, you are asked to monitor the status of your IPsec and GRE tunnels.

In the Netskope Admin UI, which two sections would you use in this scenario? (Choose two.)

A.

Steering Configuration page under Settings

B.

Bandwidth Consumption module of Digital Experience Management

C.

Network Steering page of Digital Experience Management

D.

IPsec Site and GRE Site paqes under Settinqs

Full Access
Question # 20

In which two scenarios would you use SD-WAN technology? (Choose two.)

A.

to differentiate between corporate and personal SaaS applications

B.

to optimize utilization and performance across multiple Internet connections

C.

to ensure a user's corporate laptop has all of the required security compliance software in place

D.

to replace dedicated MPLS connections with multiple broadband WAN and mobile options

Full Access
Question # 21

In the Skope IT interface, which two event tables would be used to label a cloud application instance? (Choose two.)

A.

Network Events

B.

Page Events

C.

Application Events

D.

Alerts

Full Access
Question # 22

Your organization has implemented Netskope Private Access (NPA) for all users. Users from the European region are reporting that they are unable to access many of their applications. You suspect that the publishers for the European data center may be disconnected and you want to verify the Publishers' status.

Which two methods describe how you would accomplish this task? (Choose two.)

A.

Use the Status field on the Publishers page.

B.

Use the Network Events page in

C.

Use the Netskope Private Access Troubleshooter.

D.

Use the Private Apps page in

Full Access
Question # 23

When designing an architecture with Netskope Private Access, which element guarantees connectivity between the Netskope cloud and the private application?

A.

Netskope Publisher

B.

API connector

C.

Third-party router with GRE/IPsec support

D.

Netskope Client

Full Access
Question # 24

What are two reasons why legacy solutions, such as on-premises firewalls and proxies, fail to secure the data and data access compared to Netskope Secure Web Gateway? (Choose two.)

A.

Legacy solutions are unable to see the user who is trying to access the application.

B.

The applications where the data resides are no longer in one central location.

C.

Legacy solutions do not meet compliance standards.

D.

The users accessing this data are not in one central place.

Full Access
Question # 25

What are two supported ways to provision users to your customer's Netskope tenant? (Choose two.)

A.

Use Microsoft Intune.

B.

Use the AD Connector.

C.

Use SCIM.

D.

Use the Directory Importer.

Full Access
Question # 26

Which Netskope platform component uses NewEdge Traffic Management for traffic steering?

A.

Cloud Exchange

B.

Client

C.

Data Plane On-Premises

D.

Explicit Proxy Over Tunnel

Full Access
Question # 27

You are required to restrict cloud users from uploading data to any risky cloud storage service as defined by the Cloud Confidence Index. In the Netskope platform, which two policy elements would enable you to implement this control? (Choose two)

A.

Device Classification

B.

Category

C.

Cloud App

D.

Cloud Confidence Level

Full Access
Question # 28

When comparing data in motion with data at rest, which statement is correct?

A.

Data at rest cannot be scanned for malware until a user opens the file.

B.

Data in motion requires API integration.

C.

Data in motion requires the Netskope client.

D.

Data at rest requires API integration.

Full Access
Question # 29

You are required to provide an additional pop-up warning to users before allowing them to proceed to Web applications categorized as "low" or "poor" by Netskope's Cloud Confidence Index. Which action would allow you to accomplish this task?

A.

Enable RBI on the uncategorized domains

B.

Create a policy limiting usage of generative AI.

C.

Redirect the user to the company banner page for the Web usage policy.

D.

Enable real-time user coaching based on CCL.

Full Access
Question # 30

What are two valid use cases for the Cloud Confidence Index (CCI)? (Choose two.)

A.

To recategorize cloud applications in the database

B.

To delete cloud applications from the database

C.

To identify the activities that Netskope supports for cloud applications

D.

To compare similar cloud applications

Full Access
Question # 31

You want to enable Netskope to gain visibility into your users' cloud application activities in an inline mode.

In this scenario, which two deployment methods would match your inline use case? (Choose two.)

A.

Use a forward proxy.

B.

Use an API connector

C.

Use a log parser.

D.

Use a reverse proxy.

Full Access
Question # 32

What is a benefit that Netskope instance awareness provides?

A.

It prevents movement of corporate sensitive data to a personal Dropbox account.

B.

It prevents the user from copying information from a corporate email and pasting the information into a GitHub repository.

C.

It differentiates between an IT managed Google Drive instance versus a personal Dropbox account.

D.

It differentiates between an IT managed Google Drive instance versus a personal Google Drive instance.

Full Access
Question # 33

Exhibit

Which portion of the interface shown in the exhibit allows an administrator to set severity, assign ownership, track progress, and perform forensic analysis with excerpts of violating content?

A.

Skope IT-> Alerts

B.

Incidents -> DLP

C.

API-enabled Protection -> Inventory

D.

Reports -> New Report

Full Access
Question # 34

An administrator wants to determine to which data plane a user is traversing. In this scenario, what are two ways to accomplish this task? (Choose two.)

A.

Settings -> Security Cloud Platform -> Devices

B.

Settings -> Security Cloud Platform -> Client Configuration

C.

SkopeIT -> Alerts -> View Details

D.

System Tray -> Configuration

Full Access
Question # 35

Which two capabilities are part of Netskope's Adaptive Zero Trust Data Protection? (Choose two.)

A.

contextual risk awareness

B.

continuous adaptive policies

C.

continuous enforcement of all policies

D.

contextual metadata storage

Full Access
Question # 36

Click the Exhibit button.

Referring to the exhibit, what are two recommended steps to be set on the perimeter device to monitor IPsec tunnels to a Netskope data plane? (Choose two.)

A.

Enable IKE Dead Peer Detection (DPD) for each tunnel.

B.

Send ICMP requests to the Netskope location's Probe IP

C.

Send HTTP requests to the Netskope location's Probe IP.

D.

Send ICMP requests to the Netskope location's proxy IPs.

Full Access
Question # 37

There is a DLP violation on a file in your sanctioned Google Drive instance. The file is in a deleted state. You need to locate information pertaining to this DLP violation using Netskope. In this scenario, which statement is correct?

A.

You can find DLP violations under Forensic profiles.

B.

DLP incidents for a file are not visible when the file is deleted.

C.

You can find DLP violations under the Incidents dashboard.

D.

You must create a forensic profile so that an incident is created.

Full Access
Question # 38

What are two primary advantages of Netskope's Secure Access Service Edge (SASE) architecture? (Choose two.

A.

no on-premises hardware required for policy enforcement

B.

Bayesian spam filtering

C.

Endpoint Detection and Response (EDR)

D.

single management console

Full Access