Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What are two uses for deploying a Netskope Virtual Appliance? (Choose two.)

A.

as an endpoint for Netskope Private Access (NPA)

B.

as a local reverse-proxy to secure a SaaS application

C.

as a log parser to discover in-use cloud applications

D.

as a Secure Forwarder to steer traffic

Full Access
Question # 5

You want to take into account some recent adjustments to CCI scoring that were made in your Netskope tenant.

In this scenario, which two CCI aspects in the Ul would be used in a real-time protection policy? (Choose two.)

A.

App Tag

B.

CCL

C.

App Score

D.

GDPR Readiness

Full Access
Question # 6

According to Netskope. what are two preferred methods to report a URL miscategorization? (Choose two.)

B.

Use the URL Lookup page in the dashboard.

C.

Email support@netskope.com.

D.

Tag Netskope on Twitter.

Full Access
Question # 7

Your organization has recently implemented Netskope Private Access. During an investigation, your security team has asked you to provide a list of all hosts including domains and IP addresses that a user accessed through Netskope Private Access for the past seven days.

Which two locations in the Netskope Web UI would allow you to obtain and export the requested data? (Choose two.)

A.

Private Apps page in SkopeIT

B.

Users page in SkopeIT

C.

Network Events page in SkopeIT

D.

Transaction Events collection in Advanced Analytics

Full Access
Question # 8

Which Netskope platform component uses NewEdge Traffic Management for traffic steering?

A.

Cloud Exchange

B.

Client

C.

Data Plane On-Premises

D.

Explicit Proxy Over Tunnel

Full Access
Question # 9

What are two fundamental differences between the inline and API implementation of the Netskope platform? (Choose two.)

A.

The API implementation can be used with both sanctioned and unsanctioned applications.

B.

The API implementation can only be used with sanctioned applications.

C.

The inline implementation can effectively block a transaction in both sanctioned and unsanctioned applications.

D.

The inline implementation can only effectively block a transaction in sanctioned applications.

Full Access
Question # 10

Your company has implemented Netskope's Cloud Firewall and requires that all FTP connections are blocked regardless of the ports being used.

Which two statements correctly identify how to block FTP access? (Choose two.)

A.

Create a Real-time Protection policy with FTP as the destination application and Block as the action.

B.

Create a Real-time Protection policy with a custom Firewall App Definition for TCP port 21 as the destination application and Block as the action.

C.

Ensure there are no Real-time Protection polices that allow FTP and change the default non-Web action to Block.

D.

Create a custom Firewall App Definition for TCP port 21 and add it to the default tenant Steering Configuration as an exception.

Full Access
Question # 11

You need to locate events for specific activities such as "edit" or "login successful" in a cloud application.

In which SkopeIT Events & Alerts page would this information be found?

A.

Endpoint Events

B.

Page Events

C.

Application Events

D.

Websites

Full Access
Question # 12

You want to block access to sites that use self-signed certificates. Which statement is true in this scenario?

A.

Certificate-related settings apply globally to the entire customer tenant.

B.

Certificate-related settings apply to each individual steering configuration level.

C.

Certificate-related settings apply to each individual client configuration level.

D.

Self-signed certificates must be changed to a publicly trusted CA signed certificate.

Full Access
Question # 13

Which two statements describe a website categorized as a domain generated algorithm (DGA)? (Choose two.)

A.

The website is used for domain registration.

B.

The domain contains malicious algorithms.

C.

The website is used to hide a command-and-control server.

D.

The domain was created by a program.

Full Access
Question # 14

A company is attempting to steer traffic to Netskope using GRE tunnels. They notice that after the initial configuration, users cannot access external websites from their browsers.

What are three probable causes for this issue? (Choose three.)

A.

The pre-shared key for the GRE tunnel is incorrect.

B.

The configured GRE peer in the Netskope platform is incorrect.

C.

The corporate firewall might be blocking GRE traffic.

D.

The route map was applied to the wrong router interface.

E.

Netskope does not support GRE tunnels.

Full Access
Question # 15

When comparing data in motion with data at rest, which statement is correct?

A.

Data at rest cannot be scanned for malware until a user opens the file.

B.

Data in motion requires API integration.

C.

Data in motion requires the Netskope client.

D.

Data at rest requires API integration.

Full Access
Question # 16

You need to provide a quick view under the Skope IT Applications page showing only risky shadow IT cloud applications being used.

In this scenario, which two filter combinations would you use to accomplish this task? (Choose two.)

A.

Sanctioned = No

B.

CCL = High. Under Research

C.

User Device Type = Windows Device

D.

CCL = Medium. Low, Poor

Full Access
Question # 17

Users are connecting to sanctioned cloud applications from public computers, such as from a hotel business center.

Which traffic steering method would work in this scenario?

A.

proxy chaining

B.

IPsec/GRE tunnel

C.

reverse proxy

D.

steering client

Full Access
Question # 18

Why would you want to define an App Instance?

A.

to create an API Data Protection Policy for a personal Box instance

B.

to differentiate between an enterprise Google Drive instance vs. a personal Google Drive instance

C.

to enable the instance_id attribute in the advanced search field when using query mode

D.

to differentiate between an enterprise Google Drive instance vs. an enterprise Box instance

Full Access
Question # 19

What are two pillars of CASB? (Choose two.)

A.

visibility

B.

compliance

C.

cloud native

D.

SASE

Full Access
Question # 20

You are required to create a policy that will notify and allow users to log into their personal Google Drive instance.

Which two policy components must be configured to enforce this use case? (Choose two.)

A.

Storage Constraint Profile

B.

Steering Exception

C.

User Alert

D.

User Constraint Profile

Full Access
Question # 21

When comparing data in motion with data at rest, which statement is correct?

A.

Data at rest requires API integration.

B.

Data in motion requires API integration.

C.

Data at rest cannot be scanned for malware until a user opens the file.

D.

Data in motion requires the Netskope client.

Full Access
Question # 22

As an administrator, you are investigating an increase in the number of incidents related to compromised credentials. You are using the Netskope Compromised Credentials feature on your tenant to assess the situation. Which insights would you find when using this feature? (Choose two)

A.

Compromised usernames

B.

Breach information source

C.

Compromised passwords

D.

Affected managed applications

Full Access
Question # 23

What correctly defines the Zero Trust security model?

A.

least privilege access

B.

multi-layered security

C.

strong authentication

D.

double encryption

Full Access
Question # 24

In which two scenarios would you use SD-WAN technology? (Choose two.)

A.

to differentiate between corporate and personal SaaS applications

B.

to optimize utilization and performance across multiple Internet connections

C.

to ensure a user's corporate laptop has all of the required security compliance software in place

D.

to replace dedicated MPLS connections with multiple broadband WAN and mobile options

Full Access
Question # 25

When using an out-of-band API connection with your sanctioned cloud service, what are two capabilities available to the administrator? (Choose two.)

A.

to quarantine malware

B.

to find sensitive content

C.

to block uploads

D.

to allow real-time access

Full Access
Question # 26

What are two correct methods to gather logs from the Netskope Client? (Choose two.)

A.

From the Netskope Console in the device detail view, select Collect Log.

B.

Right-click on the Netskope task tray icon and click Save Logs...

C.

Open the Netskope Client application and click the Advanced Debugging button.

D.

Search for the systeminfo.log file in Explorer and submit the results.

Full Access
Question # 27

Which two technologies form a part of Netskope's Threat Protection module? (Choose two.)

A.

log parser

B.

DLP

C.

sandbox

D.

heuristics

Full Access
Question # 28

You want to see the actual data that caused the policy violation within a DLP Incident view.

In this scenario, which profile must be set up?

A.

Quarantine Profile

B.

Forensics Profile

C.

Legal Hold Profile

D.

a GDPR DLP Profile

Full Access
Question # 29

When designing an architecture with Netskope Private Access, which element guarantees connectivity between the Netskope cloud and the private application?

A.

Netskope Publisher

B.

API connector

C.

Third-party router with GRE/IPsec support

D.

Netskope Client

Full Access
Question # 30

What are two CASB inline interception use cases? (Choose two.)

A.

blocking file uploads to a personal Box account

B.

running a retroactive scan for data at rest in Google Drive

C.

using the Netskope steering client to provide user alerts when sensitive information is posted in Slack

D.

scanning Dropbox for credit card information

Full Access
Question # 31

When accessing an encrypted website (HTTPS), what is a reason why you might receive a "certificate not trusted" browser message?

A.

A certificate authority is installed on the server.

B.

A self-signed certificate is installed on the server.

C.

A public certificate is installed on the server.

D.

There is no certificate installed on the server.

Full Access
Question # 32

What are two reasons why legacy solutions, such as on-premises firewalls and proxies, fail to secure the data and data access compared to Netskope Secure Web Gateway? (Choose two.)

A.

Legacy solutions are unable to see the user who is trying to access the application.

B.

The applications where the data resides are no longer in one central location.

C.

Legacy solutions do not meet compliance standards.

D.

The users accessing this data are not in one central place.

Full Access
Question # 33

You are working with traffic from applications with pinned certificates. In this scenario, which statement is correct?

A.

An exception should be added to the steering configuration.

B.

The domains used by certificate-pinned applications should be added to the authentication bypass list.

C.

Traffic with pinned certificates should be blocked.

D.

The domains used by applications with pinned certificates should be allowed in an inline policy.

Full Access
Question # 34

Your company asks you to obtain a detailed list of all events from the last 24 hours for a specific user. In this scenario, what are two methods to accomplish this task? (Choose two.)

A.

Use the Netskope reporting engine.

B.

Export the data from Skope IT Application Events.

C.

Use the Netskope REST API.

D.

Export the data from Skope IT Alerts.

Full Access
Question # 35

What is the limitation of using a legacy proxy compared to Netskope's solution?

A.

Netskope architecture requires on-premises components.

B.

Legacy solutions offer higher performance and scalability for corporate and remote users.

C.

Legacy on-premises solutions fail to provide protection for traffic from on-premises users.

D.

To enforce policies, traffic needs to traverse back through a customer's on-premises security stack.

Full Access
Question # 36

Exhibit

Which portion of the interface shown in the exhibit allows an administrator to set severity, assign ownership, track progress, and perform forensic analysis with excerpts of violating content?

A.

Skope IT-> Alerts

B.

Incidents -> DLP

C.

API-enabled Protection -> Inventory

D.

Reports -> New Report

Full Access
Question # 37

You determine that a business application uses non-standard HTTPS ports. You want to steer all HTTPS traffic for this application and have visibility and control over user activities.

Which action will allow you to accomplish this task?

A.

Create a steering exception for the application's domain and ports.

B.

Define a Private Agg for the application's domain and ports.

C.

Configure Non-standard ports in the Steering Configuration.

D.

Select All Traffic in the Steering Configuration.

Full Access
Question # 38

Which three security controls are offered by the Netskope Cloud platform? (Choose three.)

A.

identity lifecycle management

B.

data loss prevention for SMTP

C.

cloud security posture management

D.

endpoint anti-malware

E.

threat protection

Full Access