New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Netskope NSK100 Dumps Questions Answers

Page: 1 / 5
Total 60 questions

Netskope Certified Cloud Security Administrator Exam Questions and Answers

Question 1

Which two technologies form a part of Netskope's Threat Protection module? (Choose two.)

Options:

A.

log parser

B.

DLP

C.

sandbox

D.

heuristics

Buy Now
Question 2

You want to prevent Man-in-the-Middle (MITM) attacks on an encrypted website or application. In this scenario, which method would you use?

Options:

A.

Use a stronger encryption algorithm.

B.

Use certificate pinning.

C.

Use a proxy for the connection.

D.

Use a weaker encryption algorithm.

Question 3

You want to use an out-of-band API connection into your sanctioned Microsoft 365 OneDrive for Business application to find sensitive content, enforce near real-time policy controls, and quarantine malware.

In this scenario, which primary function in the Netskope platform would you use to connect your application to Netskope?

Options:

A.

DLP forensics

B.

Risk Insights

C.

laaS API-enabled Protection

D.

SaaS API-enabled Protection

Question 4

Exhibit

Which portion of the interface shown in the exhibit allows an administrator to set severity, assign ownership, track progress, and perform forensic analysis with excerpts of violating content?

Options:

A.

Skope IT-> Alerts

B.

Incidents -> DLP

C.

API-enabled Protection -> Inventory

D.

Reports -> New Report

Question 5

You need to provide a quick view under the Skope IT Applications page showing only risky shadow IT cloud applications being used.

In this scenario, which two filter combinations would you use to accomplish this task? (Choose two.)

Options:

A.

Sanctioned = No

B.

CCL = High. Under Research

C.

User Device Type = Windows Device

D.

CCL = Medium. Low, Poor

Question 6

Which two statements describe a website categorized as a domain generated algorithm (DGA)? (Choose two.)

Options:

A.

The website is used for domain registration.

B.

The domain contains malicious algorithms.

C.

The website is used to hide a command-and-control server.

D.

The domain was created by a program.

Question 7

You want to set up a Netskope API connection to Box.

What two actions must be completed to enable this connection? (Choose two.)

Options:

A.

Install the Box desktop sync client.

B.

Authorize the Netskope application in Box.

C.

Integrate Box with the corporate IdP.

D.

Configure Box in SaaS API Data protection.

Question 8

You are required to mitigate malicious scripts from being downloaded into your corporate devices every time a user goes to a website. Users need to access websites from a variety of categories, including new websites.

Which two actions would help you accomplish this task while allowing the user to work? (Choose two.)

Options:

A.

Allow the user to browse uncategorized domains but restrict edit activities.

B.

Block malware detected on download activity for all remaining categories.

C.

Block known bad websites and enable RBI to uncategorized domains.

D.

Allow a limited amount of domains and block everything else.

Question 9

In which scenario would you use a SAML reverse proxy?

Options:

A.

When the API-enabled protection exceeds the Cloud App API usage limits and cannot be used anymore.

B.

When the organization wants to perform inline inspection of cloud application traffic for roaming users that do not have the Netskope agent installed.

C.

When there are multiple SAML IdPs in use and the SAML reverse proxy can help federate them all together.

D.

When PAC files or explicit proxies can be used to steer traffic to the Netskope platform.

Question 10

Which two cloud security and infrastructure enablement technologies does Secure Access Service Edge (SASE) combine into its unified platform? (Choose two.)

Options:

A.

Distributed Denial of Service Protection (DDoS)

B.

Zero Trust Network Access (ZTNA)

C.

Cloud Access Security Broker (CASB)

D.

Unified Threat Management (UTM)

Question 11

When using an out-of-band API connection with your sanctioned cloud service, what are two capabilities available to the administrator? (Choose two.)

Options:

A.

to quarantine malware

B.

to find sensitive content

C.

to block uploads

D.

to allow real-time access

Question 12

Why would you want to define an App Instance?

Options:

A.

to create an API Data Protection Policy for a personal Box instance

B.

to differentiate between an enterprise Google Drive instance vs. a personal Google Drive instance

C.

to enable the instance_id attribute in the advanced search field when using query mode

D.

to differentiate between an enterprise Google Drive instance vs. an enterprise Box instance

Question 13

Which three technologies describe the primary cloud service models as defined by the National Institute of Standards and Technology (NIST)? (Choose three.)

Options:

A.

Cloud Service Provider (CSP)

B.

Identity as a Service (IDaaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)

E.

Infrastructure as a Service (laaS)

Question 14

What correctly defines the Zero Trust security model?

Options:

A.

least privilege access

B.

multi-layered security

C.

strong authentication

D.

double encryption

Question 15

You have an issue with the Netskope client connecting to the tenant.

In this scenario, what are two ways to collect the logs from the client machine? (Choose two.)

Options:

A.

from the Netskope client Ul About page

B.

from the command line using the nsdiag command

C.

from the Netskope client system tray icon

D.

from the Netskope client Ul Configuration page

Question 16

A company is attempting to steer traffic to Netskope using GRE tunnels. They notice that after the initial configuration, users cannot access external websites from their browsers.

What are three probable causes for this issue? (Choose three.)

Options:

A.

The pre-shared key for the GRE tunnel is incorrect.

B.

The configured GRE peer in the Netskope platform is incorrect.

C.

The corporate firewall might be blocking GRE traffic.

D.

The route map was applied to the wrong router interface.

E.

Netskope does not support GRE tunnels.

Question 17

You consume application infrastructure (middleware) capabilities by a third-party provider. What is the cloud service model that you are using in this scenario?

Options:

A.

PaaS

B.

MaaS

C.

DaaS

D.

SaaS

Question 18

You are working with traffic from applications with pinned certificates. In this scenario, which statement is correct?

Options:

A.

An exception should be added to the steering configuration.

B.

The domains used by certificate-pinned applications should be added to the authentication bypass list.

C.

Traffic with pinned certificates should be blocked.

D.

The domains used by applications with pinned certificates should be allowed in an inline policy.

Page: 1 / 5
Total 60 questions