Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

NSK200 Exam Dumps - Netskope Certified Cloud Security Integrator (NCCSI)

Go to page:
Question # 17

Review the exhibit.

You receive a service request from a user who indicates that their Netskope client is in a disabled state. The exhibit shows an excerpt (rom the affected client nsdebuglog.log.

What is the problem in this scenario?

A.

User authentication failed during IdP-based enrollment.

B.

The Netskope client connection is being decrypted.

C.

Custom installation parameters are incorrectly specified

D.

The user's account has not been provisioned into Netskope.

Full Access
Question # 18

You discover the ongoing use of the native Dropbox client in your organization. Although Dropbox is not a corporate-approved application, you do not want to prevent the use of Dropbox. You do, however, want to ensure visibility into its usage.

A.

Change Windows and Mac steering exception actions to use Tunnel mode and set Netskope as the source IP address for SSO services.

B.

Modify the existing tenant steering exception configuration to block the Dropbox native application to force users to use the Dropbox website.

C.

Remove all Dropbox entries from the tenant steering SSL configuration entirely.

D.

Create a new tenant steering exception type of Destination Locations that contains the Dropbox application.

Full Access
Question # 19

You have deployed a development Web server on a public hosting service using self-signed SSL certificates. After some troubleshooting, you determined that when the Netskope client is enabled, you are unable to access the Web server over SSL. The default Netskope tenant steering configuration is in place.

In this scenario, which two settings are causing this behavior? (Choose two.)

A.

SSL pinned certificates are blocked.

B.

Untrusted root certificates are blocked.

C.

Incomplete certificate trust chains are blocked.

D.

Self-signed server certificates are blocked.

Full Access
Question # 20

You are given an MD5 hash of a file suspected to be malware by your security incident response team. They ask you to offer insight into who has encountered this file and from where was the threat initiated. In which two Skope IT events tables would you search to find the answers to these questions? (Choose two.)

A.

Application Events

B.

Network Events

C.

Alerts

D.

Page Events

Full Access
Question # 21

Your company wants to know if there has been any unusual user activity. In the UI, you go to Skope IT -> Alerts.

Which two types of alerts would you filter to find this information? (Choose two.)

A.

Alert type = uba

B.

Alert type = anomaly

C.

Alert type = malware

D.

Alert type = policy

Full Access
Question # 22

Review the exhibit.

add log-upload syslogng parserconfig set log-upload syslogng parserconfig 0

logsource <log-source>

You are asked to deploy a virtual appliance OPLP to accept syslog messages directly from the enterprise Palo Alto Networks firewall. You believe that you have configured the OPLP to accept the firewall logs, yet they are not appearing in Risk Insights. Referring to the exhibit, which parser name would be required to complete the new configuration?

A.

panw-syslog

B.

sfwder

C.

custom-csv

D.

squid

Full Access
Question # 23

Review the exhibit.

What is the purpose of the configuration page shown Ii the exhibit?

A.

to provision a Netskope client using SCCM

B.

to allow users to authenticate against the proxy

C.

to onboard Active Directory users to a Netskope tenant

D.

to enforce administrative role-based access

Full Access
Question # 24

You want to reduce false positives by only triggering policies when contents of your customer database are uploaded to Dropbox. Your maximum database size is 2 MB. In this scenario, what are two ways to accomplish this task? (Choose two.)

A.

Upload the .csv export lo the Netskope tenant DLP rules section to create an exact match hash.

B.

Use the Netskope client to upload the .csv export to the Netskope management plane DLP container.

C.

Send the .csv export to Netskope using a support ticket with the subject, "create exact match hash".

D.

Use a Netskope virtual appliance to create an exact match hash.

Full Access
Go to page: