New Year Special Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

NSK101 Netskope Certified Cloud Security Administrator (NCCSA) Questions and Answers

Questions 4

Click the Exhibit button.

Referring to the exhibit, which statement accurately describes the difference between Source IP (Egress) and Source IP (User) address?

Options:

A.

Source IP (Egress) is the IP address of the destination Web server while Source IP (User) is the IP address assigned to your network.

B.

Source IP (Egress) is the IP address assigned to the endpoint host IP address while Source IP (User) is the public IP address of your Internet edge router.

C.

You must always leave the source IP fields blank and configure the user identity as a source criteria.

D.

Source IP (Egress) is the public IP address of your Internet edge router while Source IP (User) is the address assigned to the endpoint.

Buy Now
Questions 5

Click the Exhibit button.

Referring to the exhibit, you have a user reporting that a blocked website is needed for legitimate business reasons. Upon review, you determine that the user has been blocked by the Global Block policy. You need to create an exception forthat domain. You create a custom URL list that includes the domain.

In this scenario, which two actions would allow this access? (Choose two.)

Options:

A.

Create a custom category with the custom URL list as an included URL list and add it to an allow policy below the triggered Global Block policy.

B.

Create a custom category with the custom URL list as an included URL list and add it to an allow policy above the triggered Global Block policy.

C.

Add the custom URL list as an excluded URL list to the category in the Global Allow policy.

D.

Add the custom URL list as an excluded URL list to the category in the Global Block policy.

Buy Now
Questions 6

Which three technologies describe the primary cloud service models as defined by the National Institute of Standards and Technology (NIST)? (Choose three.)

Options:

A.

Cloud Service Provider (CSP)

B.

Identity as a Service (IDaaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)

E.

Infrastructure as a Service (laaS)

Buy Now
Questions 7

A company user cannot open a sports news site. You want to review the category of the website and see how the rules are applied even though this category is allowed. In this scenario, which action will accomplish this task?

Options:

A.

Use the Forensic profile

B.

Use www.netskope.com/url-lookup.

C.

Use the URL Lookup page in the dashboard.

D.

Verify with your own computer and use Advanced Debugging.

Buy Now
Questions 8

Click the Exhibit button.

A customer has created a CASB API-enabled Protection policy to detect files containing sensitive data that are shared outside of their organization.

Referring to the exhibit, which statement is correct?

Options:

A.

The administrator needs to use Shared Externally as the only shared option.

B.

The administrator needs to use Shared Externally and Public as the shared options.

C.

The administrator must select Private as the only shared option.

D.

The administrator needs to use Public as the only shared option.

Buy Now
Questions 9

What is a benefit that Netskope instance awareness provides?

Options:

A.

It prevents movement of corporate sensitive data to a personal Dropbox account.

B.

It prevents the user from copying information from a corporate email and pasting the information into a GitHub repository.

C.

It differentiates between an IT managed Google Drive instance versus a personal Dropbox account.

D.

It differentiates between an IT managed Google Drive instance versus a personal Google Drive instance.

Buy Now
Questions 10

Which three statements about Netskope Private Access Publishers are correct? (Choose three.)

Options:

A.

Publishers can run on Windows or Linux servers.

B.

Publishers can be deployed in both private data centers and public cloud providers to provide access to applications across disparate locations.

C.

Publisher deployment can be automated in public cloud environments using Netskope's REST API.

D.

Publishers only make outbound connections to the Netskope Security Cloud which reduces the amount of public exposure.

E.

Publishers can be deployed as hardware or software appliances to provide access to applications across disparate locations.

Buy Now
Questions 11

Which Netskope platform component uses NewEdge Traffic Management for traffic steering?

Options:

A.

Cloud Exchange

B.

Client

C.

Data Plane On-Premises

D.

Explicit Proxy Over Tunnel

Buy Now
Questions 12

Which two cloud security and infrastructure enablement technologies does Secure Access Service Edge (SASE) combine into its unified platform? (Choose two.)

Options:

A.

Distributed Denial of Service Protection (DDoS)

B.

Zero Trust Network Access (ZTNA)

C.

Cloud Access Security Broker (CASB)

D.

Unified Threat Management (UTM)

Buy Now
Questions 13

Which two functions are available for both inline and API protection? (Choose two.)

Options:

A.

multi-factor authentication

B.

threat protection

C.

DLP

D.

Cloud Security Posture Management (CSPM)

Buy Now
Questions 14

You are working with a large retail chain and have concerns about their customer data. You want to protect customer credit card data so that it is never exposed in transit or at rest. In this scenario, which regulatory compliance standard should be used to govern this data?

Options:

A.

SOC 3

B.

PCI-DSS

C.

AES-256

D.

ISO 27001

Buy Now
Questions 15

When comparing data in motion with data at rest, which statement is correct?

Options:

A.

Data at rest requires API integration.

B.

Data in motion requires API integration.

C.

Data at rest cannot be scanned for malware until a user opens the file.

D.

Data in motion requires the Netskope client.

Buy Now
Questions 16

You need to block all users from uploading data files into risky collaboration applications. Which element must you configure within Netskope's CASB to accomplish this task?

Options:

A.

DLP Rule

B.

real-time policy

C.

DLP Profile

D.

block notification

Buy Now
Questions 17

Which three statements are correct about Netskope's NewEdge Security Cloud Network Infrastructure? (Choose three.)

Options:

A.

It takes advantage of the public cloud by deploying security services on Google Cloud Platform.

B.

It includes direct peering with Microsoft and Google in every data center.

C.

It is a private security cloud network that is massively over provisioned, highly elastic, and built for scale.

D.

It delivers a single, unified network with no surcharges or reliance on public cloud infrastructure or virtual PoPs.

E.

It simplifies the administrator's job by limiting access to pre-defined availability zones.

Buy Now
Questions 18

What are two uses for deploying a Netskope Virtual Appliance? (Choose two.)

Options:

A.

as an endpoint for Netskope Private Access (NPA)

B.

as a local reverse-proxy to secure a SaaS application

C.

as a log parser to discover in-use cloud applications

D.

as a Secure Forwarder to steer traffic

Buy Now
Questions 19

You want to determine which NewEdge data planes that your remote users have been recently using.

Which area of the Netskope Tenant UI would provide this information?

Options:

A.

Client Steering under Digital Experience Management

B.

Network Steering under Digital Experience Management

C.

Users page under Settings

D.

Devices page under Settings

Buy Now
Questions 20

Which two controls are covered by Netskope's security platform? (Choose two.)

Options:

A.

ZTNA

B.

VPN

C.

CASB

D.

EDR

Buy Now
Questions 21

An administrator wants to determine to which data plane a user is traversing. In this scenario, what are two ways to accomplish this task? (Choose two.)

Options:

A.

Settings -> Security Cloud Platform -> Devices

B.

Settings -> Security Cloud Platform -> Client Configuration

C.

SkopeIT -> Alerts -> View Details

D.

System Tray -> Configuration

Buy Now
Questions 22

A user has performed a bulk delete activity. In this scenario, which Netskope feature monitors potential risky users for a malicious activity that would cause data loss?

Options:

A.

Netskope's Threat Protection inline policies

B.

Netskope's Behavior Analytics rule-based policies

C.

Netskope's API Data Protection policies

D.

Netskope's Cloud Threat Exchange integration

Buy Now
Questions 23

You determine that a business application uses non-standard HTTPS ports. You want to steer all HTTPS traffic for this application and have visibility and control over user activities.

Which action will allow you to accomplish this task?

Options:

A.

Create a steering exception for the application's domain and ports.

B.

Define a Private Agg for the application's domain and ports.

C.

Configure Non-standard ports in the Steering Configuration.

D.

Select All Traffic in the Steering Configuration.

Buy Now
Questions 24

What are two use cases for Netskope's DLP solution? (Choose two.)

Options:

A.

to stop unintentional data movement

B.

to detect malware in files before they are uploaded to a cloud application

C.

to detect sensitive data in password protected files

D.

to ensure regulatory compliance

Buy Now
Questions 25

How does a cloud security solution achieve visibility into TLS/SSL-protected Web traffic?

Options:

A.

by altering the TLS handshake and forcing the website to use a weak encryption algorithm which can be brute-forced

B.

by altering the TLS handshake and forcing the website to use insecure (HTTP) access

C.

by performing the TLS handshake on behalf of the website and replacing the site's certificate with its own

D.

by using government-issued universal decryption keys for the ciphers

Buy Now
Questions 26

Which two statements describe a website categorized as a domain generated algorithm (DGA)? (Choose two.)

Options:

A.

The website is used for domain registration.

B.

The domain contains malicious algorithms.

C.

The website is used to hide a command-and-control server.

D.

The domain was created by a program.

Buy Now
Questions 27

What are two fundamental differences between the inline and API implementation of the Netskope platform? (Choose two.)

Options:

A.

The API implementation can be used with both sanctioned and unsanctioned applications.

B.

The API implementation can only be used with sanctioned applications.

C.

The inline implementation can effectively block a transaction in both sanctioned and unsanctioned applications.

D.

The inline implementation can only effectively block a transaction in sanctioned applications.

Buy Now
Questions 28

Your organization has implemented Netskope Private Access (NPA) for all users. Users from the European region are reporting that they are unable to access many of their applications. You suspect that the publishers for the European data center may be disconnected and you want to verify the Publishers' status.

Which two methods describe how you would accomplish this task? (Choose two.)

Options:

A.

Use the Status field on the Publishers page.

B.

Use the Network Events page in

C.

Use the Netskope Private Access Troubleshooter.

D.

Use the Private Apps page in

Buy Now
Questions 29

What are two uses for deploying a Netskope Virtual Appliance? (Choose two.)

Options:

A.

to use as a log parser to discover in-use cloud applications

B.

to use as a local reverse proxy to secure a SaaS application

C.

to use as an endpoint for Netskope Private Access (NPA)

D.

to use as a secure way to generate Exact Data Match hashes

Buy Now
Questions 30

What are two CASB inline interception use cases? (Choose two.)

Options:

A.

blocking file uploads to a personal Box account

B.

running a retroactive scan for data at rest in Google Drive

C.

using the Netskope steering client to provide user alerts when sensitive information is posted in Slack

D.

scanning Dropbox for credit card information

Buy Now
Questions 31

Click the Exhibit button.

What are two use cases where the parameter shown in the exhibit is required? (Choose two.)

Options:

A.

When you create a policy to prevent file transfer between a sanctioned Google Drive and personal Google Drive.

B.

When you share the JoC between a third-party security solution and the Threat Protection Profile.

C.

When you create a policy to prevent binary files larger than 5 MB that are shared publicly on a sanctioned OneDrive.

D.

When you share Incident details about files detected in a DLP incident.

Buy Now
Questions 32

Which two technologies form a part of Netskope's Threat Protection module? (Choose two.)

Options:

A.

log parser

B.

DLP

C.

sandbox

D.

heuristics

Buy Now
Questions 33

Which two statements are correct about DLP Incidents in the Netskope platform? (Choose two.)

Options:

A.

An incident can be associated to one or more DLP policies.

B.

An incident can have one or more DLP violations.

C.

An incident can be assigned to one or more administrators.

D.

An incident can be associated to one or more DLP rules.

Buy Now
Questions 34

Exhibit

Which portion of the interface shown in the exhibit allows an administrator to set severity, assign ownership, track progress, and perform forensic analysis with excerpts of violating content?

Options:

A.

Skope IT-> Alerts

B.

Incidents -> DLP

C.

API-enabled Protection -> Inventory

D.

Reports -> New Report

Buy Now
Questions 35

You are required to present a view of all upload activities completed by users tunneled from the Los Angeles office to cloud storage applications.

Which two basic filters would you use on the SkopeIT Applications page to satisfy this requirement? (Choose two.)

Options:

A.

Activity

B.

Access Method

C.

Action

D.

CCL

Buy Now
Questions 36

All users are going through Netskope's Next Gen SWG. Your CISO requests a monthly report of all users who are accessing cloud applications with a "Low" or a "Poor" CCL, where the activity is either "Edit" or "Upload".

Using the Advanced Analytics interface, which two statements describe which actions must be performed in this scenario? (Choose two.)

Options:

A.

Create a report using the Data Collection "Page Events", filtering on the activities "Edit" and "Upload" for cloud apps with CCL values of "Low" or "Poor".

B.

Schedule a report with a monthly recurrence to be sent by e-mail with the attached PDF document at the end of each month.

C.

Create a report using the Data Collection "Application Events" filtering on the activities "Edit" and "Upload" for cloud apps with CCL values of "Low" or "Poor".

D.

Schedule a report with a monthly recurrence to be sent by SMS with the attached PDF document at the end of each month.

Buy Now
Questions 37

Your company asks you to obtain a detailed list of all events from the last 24 hours for a specific user. In this scenario, what are two methods to accomplish this task? (Choose two.)

Options:

A.

Use the Netskope reporting engine.

B.

Export the data from Skope IT Application Events.

C.

Use the Netskope REST API.

D.

Export the data from Skope IT Alerts.

Buy Now
Questions 38

Click the Exhibit button.

A user has the Netskope Client enabled with the correct steering configuration applied. The exhibit shows an inline policy that has a predefined webmail category blocked. However the user is still able to access Yahoo mail.

Which statement is correct in this scenario?

Options:

A.

The user is not part of the correct AD group or OU.

B.

The user is not steered using an explicit proxy.

C.

The webmail category does not include Yahoo mail when using an explicit proxy

D.

The user's AD group must be added to the policy.

Buy Now
Exam Code: NSK101
Exam Name: Netskope Certified Cloud Security Administrator (NCCSA)
Last Update: Jan 15, 2025
Questions: 129
NSK101 pdf

NSK101 PDF

$25.5  $84.99
NSK101 Engine

NSK101 Testing Engine

$30  $99.99
NSK101 PDF + Engine

NSK101 PDF + Testing Engine

$40.5  $134.99