Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

NSK200 Exam Dumps - Netskope Certified Cloud Security Integrator (NCCSI)

Go to page:
Question # 9

Your customer is using a virtual desktop infrastructure (VDI) for their support engineers. Multiple users will be logging into the same device, and they want to detect activities for each user.

A.

Install Netskope client in default mode and enable DTLS.

B.

Install Netskope client and create a separate steering configuration for each user.

C.

Install Netskope client in peruserconfig mode.

D.

Install Netskope client and create a separate device configuration for each user.

Full Access
Question # 10

You are deploying a Netskope client in your corporate office network. You are aware of firewall or proxy rules that need to be modified to allow traffic.

Which two statements are true in this scenario? (Choose two.)

A.

You need to allow TLS 1.1 traffic to pass through the firewalls from the users' IP to all destinations.

B.

You must enable SSL decryption in the proxy to inspect the Netskope tunnel.

C.

It is recommended to allow UDP port 443 to the Netskope IP ranges to allow DTLS.

D.

You need to allow TCP port 443 to the Netskope IP ranges or domains.

Full Access
Question # 11

Your company asks you to use Netskope to integrate with Endpoint Detection and Response (EDR) vendors such as CrowdStrike. In this scenario, what is a requirement for a successful Integration and sharing of threat data?

A.

API Client ID

B.

device classification

C.

custom log parser

D.

user endpoint

Full Access
Question # 12

Review the exhibit.

While diagnosing an NPA connectivity issue, you notice an error message in the Netskope client logs.

Referring to the exhibit, what does this error represent?

A.

The Netskope client has been load-balanced to a different data center.

B.

The primary publisher is unavailable or cannot be reached.

C.

There Is an EDNS or LDNS resolution error.

D.

There Is an upstream device trying to intercept the NPA TLS connection.

Full Access
Question # 13

A city uses many types of forms, including permit applications. These forms contain personal and financial information of citizens. Remote employees download these forms and work directly with the citizens to complete them. The city wants to be able to identify and monitor the specific forms and block the employees from downloading completed forms.

Which feature would you use to accomplish this task?

A.

exact data match (EDM)

B.

regular expressions (regex)

C.

document fingerprinting

D.

optical character recognition (OCR)

Full Access
Question # 14

You want to secure Microsoft Exchange and Gmail SMTP traffic for DLP using Netskope. Which statement is true about this scenario when using the Netskope client?

A.

Netskope can inspect outbound SMTP traffic for Microsoft Exchange and Gmail.

B.

Enable Cloud Firewall to Inspect Inbound SMTP traffic for Microsoft Exchange and Gmail.

C.

Netskope can inspect inbound and outbound SMTP traffic for Microsoft Exchange and Gmail.

D.

Enable REST API v2 to Inspect inbound SMTP traffic for Microsoft Exchange and Gmail.

Full Access
Question # 15

You are currently migrating users away from a legacy proxy to the Netskope client in the company’s corporate offices. You have deployed the client to a pilot group; however, when the client attempts to connect to Netskope, it fails to establish a tunnel.

In this scenario, what would cause this problem?

A.

The legacy proxy is intercepting SSL/TLS traffic to Netskope.

B.

The corporate firewall is blocking UDP port 443 to Netskope.

C.

The corporate firewall is blocking the Netskope EPoT address.

D.

The client cannot reach dns.google for EDNS resolution.

Full Access
Question # 16

You use Netskope to provide a default Malware Scan profile for use with your malware policies. Also, you want to create a custom malware detection profile.

In this scenario, what are two additional requirements to complete this task? (Choose two.)

A.

Add a custom hash list as an allowlist.

B.

Add a quarantine profile.

C.

Add a remediation profile.

D.

Add a custom hash list as a blocklist.

Full Access
Go to page: