11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

NSK200 Exam Dumps - Netskope Certified Cloud Security Integrator (NCCSI)

Question # 4

You are implementing tenant access security and governance controls for privileged users. You want to start with controls that are natively available within the Netskope Cloud Security Platform and do not require external or third-party integration.

Which three access controls would you use in this scenario? (Choose three.)

A.

IP allowlisting to control access based upon source IP addresses.

B.

Login attempts to set the number of failed attempts before the admin user is locked out of the Ul.

C.

Applying predefined or custom roles to limit the admin's access to only those functions required for their job.

D.

Multi-factor authentication to verify a user's authenticity.

E.

History-based access control based on past security actions.

Full Access
Question # 5

You are using the Netskope DLP solution. You notice flies containing test data for credit cards are not triggering DLP events when uploaded to Dropbox. There are corresponding page events. Which two scenarios would cause this behavior? (Choose two.)

A.

The Netskope client Is not steering Dropbox traffic.

B.

The DLP rule has the severity threshold set to a value higher than the number of occurrences.

C.

The credit card numbers in your test data are Invalid 16-dlglt numbers.

D.

There is no API protection configured for Dropbox.

Full Access
Question # 6

The director of IT asks for confirmation If your organization's Web traffic would be blocked when the Netskope client fails. In this situation, what would confirm the fail close status?

A.

Perform a right-click on the Netskope client icon using your mouse.

B.

Review the nsdebuglog.log.

C.

View Application events.

D.

Review user settings.

Full Access
Question # 7

Review the exhibit.

You are asked to create a DLP profile that will ensure that the data shown in the exhibit cannot be uploaded to a user's personal Google Drive.

What must be used to accomplish this task?

A.

document fingerprinting

B.

ML image classifier

C.

optical character recognition

D.

INTL-PAN-Name rule

Full Access
Question # 8

Your company needs to keep quarantined files that have been triggered by a DLP policy. In this scenario, which statement Is true?

A.

The files are stofed remotely In your data center assigned In the Quarantine profile.

B.

The files are stored In the Netskope data center assigned in the Quarantine profile.

C.

The files are stored In the Cloud provider assigned In the Quarantine profile.

D.

The files are stored on the administrator console PC assigned In the Quarantine profile.

Full Access
Question # 9

Your customer is using a virtual desktop infrastructure (VDI) for their support engineers. Multiple users will be logging into the same device, and they want to detect activities for each user.

A.

Install Netskope client in default mode and enable DTLS.

B.

Install Netskope client and create a separate steering configuration for each user.

C.

Install Netskope client in peruserconfig mode.

D.

Install Netskope client and create a separate device configuration for each user.

Full Access
Question # 10

You are deploying a Netskope client in your corporate office network. You are aware of firewall or proxy rules that need to be modified to allow traffic.

Which two statements are true in this scenario? (Choose two.)

A.

You need to allow TLS 1.1 traffic to pass through the firewalls from the users' IP to all destinations.

B.

You must enable SSL decryption in the proxy to inspect the Netskope tunnel.

C.

It is recommended to allow UDP port 443 to the Netskope IP ranges to allow DTLS.

D.

You need to allow TCP port 443 to the Netskope IP ranges or domains.

Full Access
Question # 11

Your company asks you to use Netskope to integrate with Endpoint Detection and Response (EDR) vendors such as CrowdStrike. In this scenario, what is a requirement for a successful Integration and sharing of threat data?

A.

API Client ID

B.

device classification

C.

custom log parser

D.

user endpoint

Full Access
Question # 12

Review the exhibit.

While diagnosing an NPA connectivity issue, you notice an error message in the Netskope client logs.

Referring to the exhibit, what does this error represent?

A.

The Netskope client has been load-balanced to a different data center.

B.

The primary publisher is unavailable or cannot be reached.

C.

There Is an EDNS or LDNS resolution error.

D.

There Is an upstream device trying to intercept the NPA TLS connection.

Full Access
Question # 13

A city uses many types of forms, including permit applications. These forms contain personal and financial information of citizens. Remote employees download these forms and work directly with the citizens to complete them. The city wants to be able to identify and monitor the specific forms and block the employees from downloading completed forms.

Which feature would you use to accomplish this task?

A.

exact data match (EDM)

B.

regular expressions (regex)

C.

document fingerprinting

D.

optical character recognition (OCR)

Full Access
Question # 14

You want to secure Microsoft Exchange and Gmail SMTP traffic for DLP using Netskope. Which statement is true about this scenario when using the Netskope client?

A.

Netskope can inspect outbound SMTP traffic for Microsoft Exchange and Gmail.

B.

Enable Cloud Firewall to Inspect Inbound SMTP traffic for Microsoft Exchange and Gmail.

C.

Netskope can inspect inbound and outbound SMTP traffic for Microsoft Exchange and Gmail.

D.

Enable REST API v2 to Inspect inbound SMTP traffic for Microsoft Exchange and Gmail.

Full Access
Question # 15

You are currently migrating users away from a legacy proxy to the Netskope client in the company’s corporate offices. You have deployed the client to a pilot group; however, when the client attempts to connect to Netskope, it fails to establish a tunnel.

In this scenario, what would cause this problem?

A.

The legacy proxy is intercepting SSL/TLS traffic to Netskope.

B.

The corporate firewall is blocking UDP port 443 to Netskope.

C.

The corporate firewall is blocking the Netskope EPoT address.

D.

The client cannot reach dns.google for EDNS resolution.

Full Access
Question # 16

You use Netskope to provide a default Malware Scan profile for use with your malware policies. Also, you want to create a custom malware detection profile.

In this scenario, what are two additional requirements to complete this task? (Choose two.)

A.

Add a custom hash list as an allowlist.

B.

Add a quarantine profile.

C.

Add a remediation profile.

D.

Add a custom hash list as a blocklist.

Full Access
Question # 17

Review the exhibit.

You receive a service request from a user who indicates that their Netskope client is in a disabled state. The exhibit shows an excerpt (rom the affected client nsdebuglog.log.

What is the problem in this scenario?

A.

User authentication failed during IdP-based enrollment.

B.

The Netskope client connection is being decrypted.

C.

Custom installation parameters are incorrectly specified

D.

The user's account has not been provisioned into Netskope.

Full Access
Question # 18

You discover the ongoing use of the native Dropbox client in your organization. Although Dropbox is not a corporate-approved application, you do not want to prevent the use of Dropbox. You do, however, want to ensure visibility into its usage.

A.

Change Windows and Mac steering exception actions to use Tunnel mode and set Netskope as the source IP address for SSO services.

B.

Modify the existing tenant steering exception configuration to block the Dropbox native application to force users to use the Dropbox website.

C.

Remove all Dropbox entries from the tenant steering SSL configuration entirely.

D.

Create a new tenant steering exception type of Destination Locations that contains the Dropbox application.

Full Access
Question # 19

You have deployed a development Web server on a public hosting service using self-signed SSL certificates. After some troubleshooting, you determined that when the Netskope client is enabled, you are unable to access the Web server over SSL. The default Netskope tenant steering configuration is in place.

In this scenario, which two settings are causing this behavior? (Choose two.)

A.

SSL pinned certificates are blocked.

B.

Untrusted root certificates are blocked.

C.

Incomplete certificate trust chains are blocked.

D.

Self-signed server certificates are blocked.

Full Access
Question # 20

You are given an MD5 hash of a file suspected to be malware by your security incident response team. They ask you to offer insight into who has encountered this file and from where was the threat initiated. In which two Skope IT events tables would you search to find the answers to these questions? (Choose two.)

A.

Application Events

B.

Network Events

C.

Alerts

D.

Page Events

Full Access
Question # 21

Your company wants to know if there has been any unusual user activity. In the UI, you go to Skope IT -> Alerts.

Which two types of alerts would you filter to find this information? (Choose two.)

A.

Alert type = uba

B.

Alert type = anomaly

C.

Alert type = malware

D.

Alert type = policy

Full Access
Question # 22

Review the exhibit.

add log-upload syslogng parserconfig set log-upload syslogng parserconfig 0

logsource <log-source>

You are asked to deploy a virtual appliance OPLP to accept syslog messages directly from the enterprise Palo Alto Networks firewall. You believe that you have configured the OPLP to accept the firewall logs, yet they are not appearing in Risk Insights. Referring to the exhibit, which parser name would be required to complete the new configuration?

A.

panw-syslog

B.

sfwder

C.

custom-csv

D.

squid

Full Access
Question # 23

Review the exhibit.

What is the purpose of the configuration page shown Ii the exhibit?

A.

to provision a Netskope client using SCCM

B.

to allow users to authenticate against the proxy

C.

to onboard Active Directory users to a Netskope tenant

D.

to enforce administrative role-based access

Full Access
Question # 24

You want to reduce false positives by only triggering policies when contents of your customer database are uploaded to Dropbox. Your maximum database size is 2 MB. In this scenario, what are two ways to accomplish this task? (Choose two.)

A.

Upload the .csv export lo the Netskope tenant DLP rules section to create an exact match hash.

B.

Use the Netskope client to upload the .csv export to the Netskope management plane DLP container.

C.

Send the .csv export to Netskope using a support ticket with the subject, "create exact match hash".

D.

Use a Netskope virtual appliance to create an exact match hash.

Full Access
Question # 25

Which statement describes how Netskope's REST API, v1 and v2, handles authentication?

A.

Both REST API v1 and v2 require the use of tokens to make calls to the API

B.

Neither REST API v1 nor v2 require the use of tokens.

C.

REST API v2 requires the use of a token to make calls to the API. while API vl does not.

D.

REST API v1 requires the use of a token to make calls to the API. while API v2 does not.

Full Access
Question # 26

Netskope support advised you to enable DTLS for belter performance. You added firewall rules to allow UDP port 443 traffic. These settings are part of which configuration element when enabled in the Netskope tenant?

A.

Real-time Protection policies

B.

SSL decryption policies

C.

steering configuration

D.

client configuration

Full Access
Question # 27

Review the exhibit.

You are asked to create a new role that allows analysts to view Events and Reports while providing user privacy. You need to avoid directly exposing identities and user location information.

Which three fields must you obfuscate in this scenario? (Choose three.)

A.

User IPs

B.

User names

C.

App names, URLs, and destination IPs

D.

File and object names

E.

Source location information

Full Access