11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

NSK300 Exam Dumps - Netskope Certified Cloud Security Architect Exam

Question # 4

Review the exhibit.

You are the proxy administrator for a medical devices company. You recently changed a pilot group of users from cloud app steering to all Web traffic. Pilot group users have started to report that they receive the error shown in the exhibit when attempting to access the company intranet site that is publicly available. During troubleshooting, you realize that this site uses your company's internal certificate authority for SSL certificates.

Which three statements describe ways to solve this issue? (Choose three.)

A.

Import the root certificate for your internal certificate authority into Netskope.

B.

Bypass SSL inspection for the affected site(s).

C.

Create a Real-time Protection policy to allow access.

D.

Change the SSL Error Settings from Block to Bypass in the Netskope tenant.

E.

Instruct the user to proceed past the error message

Full Access
Question # 5

You created a Real-time Protection policy that blocks all activities to non-corporate S3 buckets, but determine that the policy is too restrictive. Specifically, users are complaining that normal websites have stopped rendering properly.

How would you solve this problem?

A.

Create a Real-time Protection policy to allow the Browse activity to the Amazon S3 application.

B.

Create a Real-time Protection policy to allow the Browse activity to the Cloud Storage category

C.

Create a Real-time Protection policy to allow the Download activity to the Cloud Storage category

D.

Create a Real-time Protection policy to allow the Download activity to the Amazon S3 application

Full Access
Question # 6

Review the exhibit.

A user has attempted to upload a file to Microsoft OneDrive that contains source code with Pll and PCI data.

Referring to the exhibit, which statement Is correct?

A.

The user will be blocked and a single Incident will be generated referencing the DLP-PCI profile.

B.

The user will be blocked and a single Incident will be generated referencing all of the matching DLP profiles

C.

The user will be blocked and a separate incident will be generated for each of the matching DLP profiles.

D.

The user will be alerted and a single incident will be generated referencing the DLP-PII profile.

Full Access
Question # 7

A company needs to block access to their instance of Microsoft 365 from unmanaged devices. They have configured Reverse Proxy and have also created a policy that blocks login activity for the AD group "marketing-users" for theReverse Proxy access method. During UAT testing, they notice that access from unmanaged devices to Microsoft 365 is not blocked for marketing users.

What is causing this issue?

A.

There is a missing group name in the SAML response.

B.

The username in the name ID field is not in the format of the e-mail address.

C.

There is an invalid certificate in the SAML response.

D.

The username in the name ID field does not have the "marketing-users" group name.

Full Access
Question # 8

You configured a pair of IPsec funnels from the enterprise edge firewall to a Netskope data plane. These tunnels have been implemented to steer traffic for a set of defined HTTPS SaaS applications accessed from end-user devices that do not support the Netskope Client installation. You discover that all applications steered through this tunnel are non-functional.

According to Netskope. how would you solve this problem?

A.

Restart the tunnel to stop the tunnel from flapping.

B.

Downgrade from IKE v2 to IKE v1.

C.

Install the Netskope root and intermediate certificates on the end-user devices.

D.

Disable Perfect Forward Secrecy on the tunnel configuration.

Full Access
Question # 9

Review the exhibit.

You work for a medical insurance provider. You have Netskope Next Gen Secure Web Gateway deployed to all managed user devices with limited block policies. Your manager asks that you begin blocking Cloud Storage applications that are not HIPAA compliant Prior to implementing this policy, you want to verity that no business or departmental applications would be blocked by this policy.

Referring to the exhibit, which query would you use in the Edit Widget window to narrow down the results?

A.

app-ccl-compliance-cert neq 'HIPAA' and category eq 'Cloud Storage'

B.

Cloud Confidence Compliance neq HIPAA and Cloud Confidence Category is Cloud Storage

C.

SELECT application WHERE 'HIPAA' NOT IN app-cci-compliance AND WHERE 'Cloud Storage' IN category

D.

app-compliance does not contain HIPAA and category must equal Cloud Storage

Full Access
Question # 10

You are currently designing a policy for AWS S3 bucket scans with a custom DLP profile Which policy action(s) are available for this policy?

A.

Alert, Quarantine. Block, User Notification

B.

Alert, User Notification

C.

Alert only

D.

Alert,Quarantine

Full Access
Question # 11

Review the exhibit.

You are attempting to block uploads of password-protected files. You have created the file profile shown in the exhibit.

Where should you add this profile to use in a Real-time Protection policy?

A.

Add the profile to a DLP profile that is used in a Real-time Protection policy.

B.

Add the profile to a Malware Detection profile that is used in a Real-time Protection policy.

C.

Add the profile directly to a Real-time Protection policy as a Constraint.

D.

Add the profile to a Constraint profile that is used in a Real-time Protection policy.

Full Access
Question # 12

Review the exhibit.

You created an SSL decryption policy to bypass the inspection of financial and accounting Web categories. However, you still see banking websites being inspected.

Referring to the exhibit, what are two possible causes of this behavior? (Choose two.)

A.

The policy is in a "disabled" state.

B.

An incorrect category has been selected

C.

The policy is in a "pending changes" state.

D.

An incorrect action has been specified.

Full Access
Question # 13

You need to extract events and alerts from the Netskope Security Cloud platform and push it to a SIEM solution. What are two supported methods to accomplish this task? (Choose two.)

A.

Use Cloud Ticket Orchestrator.

B.

Use Cloud Log Shipper.

C.

Stream directly to syslog.

D.

Use the REST API.

Full Access
Question # 14

Review the exhibit.

You installed Directory Importer and configured it to import specific groups ot users into your Netskope tenant as shown in the exhibit. One hour after a new user has been added to the domain, the user still has not been provisioned to Netskope.

What are three potential reasons for this failure? (Choose three.)

A.

Directory Importer does not support ongoing user syncs; you must manually provision the user.

B.

The server that the Directory Importer is installed on is unable to reach Netskope's add-on endpomt.

C.

The user is not a member of the group specified as a filter

D.

Active Directory integration is not enabled on your tenant.

E.

The default collection interval is 180 minutes, therefore a sync may not have run yet.

Full Access
Question # 15

You want to integrate with a third-party DLP engine that requires ICAP. In this scenario, which Netskope platform component must be configured?

A.

On-Premises Log Parser (OPLP)

B.

Secure Forwarder

C.

Netskope Cloud Exchange

D.

Netskope Adapter

Full Access
Question # 16

You are already using Netskope CSPM to monitor your AWS accounts for compliance. Now you need to allow access from your company-managed devices running the Netskope Client to only Amazon S3 buckets owned by your organization. You must ensure that any current buckets and those created in the future will be allowed

Which configuration satisfies these requirements?

A.

Steering: Cloud Apps Only, All Traffic Policy type: Real-time Protection

Constraint: Storage. Bucket Does Not Match -ALLAccounts Action: Block

B.

Steering: Cloud Apps Only Policy type: Real-time Protection

Constraint: Storage. Bucket Does Not Match *@myorganization.com Action: Block

C.

Steering: Cloud Apps Only. All Traffic Policy type: Real-time Protection Constraint: Storage. Bucket Does Match -ALLAccounts Action: Allow

D.

Steering: All Web Traffic Policy type: API Data Protection

Constraint: Storage, Bucket Does Match *@myorganization.com Action: Allow

Full Access
Question # 17

What are three valid Instance Types for supported SaaS applications when using Netskope's API-enabled Protection? (Choose three.)

A.

Forensic

B.

API Data Protection

C.

Behavior Analytics

D.

DLP Scan

E.

Quarantine

Full Access
Question # 18

You are building an architecture plan to roll out Netskope for on-premises devices. You determine that tunnels are the best way to achieve this task due to a lack of support for explicit proxy in some instances and IPsec is the right type of tunnel to achieve the desired security and steering.

What are three valid elements that you must consider when using IPsec tunnels in this scenario? (Choose three.)

A.

cipher support on tunnel-initiating devices

B.

bandwidth considerations

C.

the categories to be blocked

D.

the impact of threat scanning performance

E.

Netskope Client behavior when on-premises

Full Access