Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

NSK200 Netskope Certified Cloud Security Integrator (NCCSI) Questions and Answers

Questions 4

Review the exhibit.

You are at the Malware Incident page. A virus was detected by the Netskope Heuristics Engine. Your security team has confirmed that the virus was a test data file You want to allow the security team to use this file

Referring to the exhibit, which two statements are correct? (Choose two.)

Options:

A.

Click the "Add To File Filter button to add the IOC to a file list.

B.

Contact the CrowdStrike administrator to have the file marked as safe.

C.

Click the ''Lookup VirusTotal" button to verify if this IOC is a false positive.

D.

Create a malware detection profile and update the file hash list with the IOC.

Buy Now
Questions 5

You want to prevent a document stored in Google Drive from being shared externally with a public link.

Options:

A.

Quarantine

B.

Threat Protection policy

C.

API Data Protection policy

D.

Real-time Protection policy

Buy Now
Questions 6

You discover the ongoing use of the native Dropbox client in your organization. Although Dropbox is not a corporate-approved application, you do not want to prevent the use of Dropbox. You do, however, want to ensure visibility into its usage.

Options:

A.

Change Windows and Mac steering exception actions to use Tunnel mode and set Netskope as the source IP address for SSO services.

B.

Modify the existing tenant steering exception configuration to block the Dropbox native application to force users to use the Dropbox website.

C.

Remove all Dropbox entries from the tenant steering SSL configuration entirely.

D.

Create a new tenant steering exception type of Destination Locations that contains the Dropbox application.

Buy Now
Questions 7

You have created a specific Skope IT application events query and want to have the query automatically run and display the results every time you log into your tenant.

Which two statements are correct in this scenario? (Choose two.)

Options:

A.

Add the Watchlist widget from the library to your home page.

B.

Export a custom Skope IT watchlist to a report and then schedule it to run daily.

C.

Save a custom Skope IT watchlist, then manage filters and share with others.

D.

Add your Skope IT query to a custom watchlist.

Buy Now
Questions 8

Review the exhibit.

Referring to the exhibit, which three statements are correct? (Choose three.)

Options:

A.

The request was processed successfully.

B.

A request was submitted to extract application event details.

C.

An invalid token was used.

D.

The request was limited to the first 5000 records.

E.

The request was confined to only the "Professional Networking and Social" category.

Buy Now
Questions 9

An engineering firm is using Netskope DLP to identify and block sensitive documents, including schematics and drawings. Lately, they have identified that when these documents are blocked, certain employees may be taking screenshots and uploading them. They want to block any screenshots from being uploaded.

Which feature would you use to satisfy this requirement?

Options:

A.

exact data match (EDM)

B.

document fingerprinting

C.

ML image classifier

D.

optical character recognition (OCR)

Buy Now
Questions 10

You want to provide malware protection for all cloud storage applications.

In this scenario, which action would accomplish this task?

Options:

A.

Create a real-time threat protection policy with a category of Cloud Storage.

B.

Apply a data protection profile.

C.

Apply a CTEP profile.

D.

Create an API threat protection policy with a category of Cloud Storage.

Buy Now
Questions 11

You have deployed Netskope Secure Web Gateway (SWG). Users are accessing new URLs that need to be allowed on a daily basis. As an SWG administrator, you are spending a lot of time updating Web policies. You want to automate this process without having to log into the Netskope tenant

Which solution would accomplish this task?

Options:

A.

You can use Cloud Log Shipper.

B.

You can minimize your work by sharing URLs with Netskope support.

C.

You can use Cloud Risk Exchange.

D.

You can use REST API to update the URL list.

Buy Now
Questions 12

Your IT organization is migrating its user directory services from Microsoft Active Directory to a cloud-based Identity Provider (IdP) solution, Azure AD. You are asked to adapt the Netskope user provisioning process to work with this new cloud-based IdP.

Options:

A.

Directory Importer

B.

Microsoft GPO

C.

SCIMApp

D.

Manual Import

Buy Now
Questions 13

Your organization has three main locations with 30.000 hosts in each location. You are planning to deploy Netskope using iPsec tunnels for security.

What are two considerations to make a successful connection in this scenario? (Choose two.)

Options:

A.

browsers in use

B.

operating systems

C.

redundant POPs

D.

number of hosts

Buy Now
Questions 14

You created the Netskope application in your IdP for user provisioning and validated that the API Integration settings are correct and functional. However, you are not able to push the user groups from the IdP into your Netskope tenant.

Options:

A.

The IdP group contains active users, as well as one or more deactivated users.

B.

The IdP does not have Create User permissions.

C.

You do not have enough users assigned to the IdP group.

D.

You failed to push the IdP users before attempting to push the IdP groups.

Buy Now
Questions 15

Your team is asked to investigate ten Netskope DLP incidents. You want to assign these incidents among different team members.

Options:

A.

Use your ticketing tool.

B.

Use the Forensic Incident workflow.

C.

Use the DLP Incident workflow.

D.

Use the Quarantine Incident workflow.

Buy Now
Questions 16

You are an administrator writing Netskope Real-time Protection policies and must determine proper policy ordering.

Which two statements are true in this scenario? (Choose two.)

Options:

A.

You must place Netskope private access malware policies in the middle.

B.

You do not need to create an "allow all" Web Access policy at the bottom.

C.

You must place DLP policies at the bottom.

D.

You must place high-risk block policies at the top.

Buy Now
Questions 17

You want to prevent a document stored in Google Drive from being shared externally with a public link. What would you configure in Netskope to satisfy this requirement?

Options:

A.

Threat Protection policy

B.

API Data Protection policy

C.

Real-time Protection policy

D.

Quarantine

Buy Now
Questions 18

You are given an MD5 hash of a file suspected to be malware by your security incident response team. They ask you to offer insight into who has encountered this file and from where was the threat initiated. In which two Skope IT events tables would you search to find the answers to these questions? (Choose two.)

Options:

A.

Application Events

B.

Network Events

C.

Alerts

D.

Page Events

Buy Now
Questions 19

With Netskope DLP, which feature would be used to detect keywords such as "Confidential" or "Access key"?

Options:

A.

Regular Expression

B.

Exact Match

C.

Fingerprint Classification

D.

Dictionary

Buy Now
Questions 20

Your organization has a homegrown cloud application. You are required to monitor the activities that users perform on this cloud application such as logins, views, and downloaded files. Unfortunately, it seems Netskope is unable to detect these activities by default.

How would you accomplish this goal?

Options:

A.

Enable access to the application with Netskope Private Access.

B.

Ensure that the cloud application is added as a steering exception.

C.

Ensure that the application is added to the SSL decryption policy.

D.

Create a new cloud application definition using the Chrome extension.

Buy Now
Questions 21

Your customer implements Netskope Secure Web Gateway to secure all Web traffic. While they have created policies to block certain categories, there are many new sites available dally that are not yet categorized. The customer's users need quick access and cannot wait to put in a request to gain access requiring a policy change or have the site's category changed.

To solve this problem, which Netskope feature would provide quick, safe access to these types of sites?

Options:

A.

Netskope Cloud Firewall (CFW)

B.

Netskope Remote Browser Isolation (RBI)

C.

Netskope Continuous Security Assessment (CSA)

D.

Netskope SaaS Security Posture Management (SSPM)

Buy Now
Questions 22

While most Web and SaaS traffic is decrypted for inspection, you are asked to prevent a certain host on the network from SSL decryption for privacy purposes.

Options:

A.

Create a steering exception for the host.

B.

Create a Real-time Protection policy, select the host, and choose to block SSL decryption.

C.

Create a Source Network Location for a Do Not Decrypt SSL policy.

D.

Add the host to the certificate-pinned application list.

Buy Now
Questions 23

You want to allow both the user identities and groups to be imported in the Netskope platform. Which two methods would satisfy this requirement? (Choose two.)

Options:

A.

Use System for Cross-domain Identity Management (SCIM).

B.

Use Manual Entries.

C.

Use Directory Importer.

D.

Use Bulk Upload with a CSV file.

Buy Now
Questions 24

You are implementing tenant access security and governance controls for privileged users. You want to start with controls that are natively available within the Netskope Cloud Security Platform and do not require external or third-party integration.

Which three access controls would you use in this scenario? (Choose three.)

Options:

A.

IP allowlisting to control access based upon source IP addresses.

B.

Login attempts to set the number of failed attempts before the admin user is locked out of the Ul.

C.

Applying predefined or custom roles to limit the admin's access to only those functions required for their job.

D.

Multi-factor authentication to verify a user's authenticity.

E.

History-based access control based on past security actions.

Buy Now
Questions 25

Review the exhibit.

You are asked to create a new Real-time Protection policy to scan SMTP emails using data loss prevention (DLP) for personal health information (PHI). The scope is limited to only emails being sent from Microsoft Exchange Online to outside recipients.

Options:

A.

Web Access policy

B.

Email Outbound policy

C.

CTEP policy

D.

DLP policy

Buy Now
Questions 26

To which three event types does Netskope's REST API v2 provide access? (Choose three.)

Options:

A.

application

B.

alert

C.

client

D.

infrastructure

E.

user

Buy Now
Questions 27

A company allows their users to access OneDrive on their managed laptops. It is against corporate policy to upload any documents to their personal OneDrive. The company needs to enforce this policy to protect their customer’s sensitive data.

What are two ways to enforce this policy? (Choose two.)

Options:

A.

Create DLP policies to block the upload of all the identified documents.

B.

Create DLP policies to allow document uploading only to the corporate OneDrive instance.

C.

Create a new application instance for the corporate OneDrive.

D.

Fingerprint all the documents to have a catalog of all the documents that the company needs to protect.

Buy Now
Exam Code: NSK200
Exam Name: Netskope Certified Cloud Security Integrator (NCCSI)
Last Update: Nov 21, 2024
Questions: 93
NSK200 pdf

NSK200 PDF

$28  $80
NSK200 Engine

NSK200 Testing Engine

$33.25  $95
NSK200 PDF + Engine

NSK200 PDF + Testing Engine

$45.5  $130