Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Netskope > Netskope Certification > NSK200

NSK200 Netskope Certified Cloud Security Integrator (NCCSI) Question and Answers

Question # 4

You want to provision users and groups to a Netskope tenant. You have Microsoft Active Directory servers hosted in two different forests. Which statement is true about this scenario?

A.

You can use the Netskope Adapter Tool for user provisioning.

B.

You can use the Netskope virtual appliance for user provisioning

C.

You cannot provision users until you migrate to Azure AD or Okta.

D.

You can use SCIM version 2 for user provisioning.

Full Access
Question # 5

What is the purpose of the file hash list in Netskope?

A.

It configures blocklist and allowlist entries referenced in the custom Malware Detection profiles.

B.

It is used to allow and block URLs.

C.

It provides the file types that Netskope can inspect.

D.

It provides Client Threat Exploit Prevention (CTEP).

Full Access
Question # 6

You want to provide malware protection for all cloud storage applications.

In this scenario, which action would accomplish this task?

A.

Create a real-time threat protection policy with a category of Cloud Storage.

B.

Apply a data protection profile.

C.

Apply a CTEP profile.

D.

Create an API threat protection policy with a category of Cloud Storage.

Full Access
Question # 7

Review the exhibit.

You are asked to create a new Real-time Protection policy to scan SMTP emails using data loss prevention (DLP) for personal health information (PHI). The scope is limited to only emails being sent from Microsoft Exchange Online to outside recipients.

A.

Web Access policy

B.

Email Outbound policy

C.

CTEP policy

D.

DLP policy

Full Access
Question # 8

You want to reduce false positives by only triggering policies when contents of your customer database are uploaded to Dropbox. Your maximum database size is 2 MB. In this scenario, what are two ways to accomplish this task? (Choose two.)

A.

Upload the .csv export lo the Netskope tenant DLP rules section to create an exact match hash.

B.

Use the Netskope client to upload the .csv export to the Netskope management plane DLP container.

C.

Send the .csv export to Netskope using a support ticket with the subject, "create exact match hash".

D.

Use a Netskope virtual appliance to create an exact match hash.

Full Access
Question # 9

You want to allow both the user identities and groups to be imported in the Netskope platform. Which two methods would satisfy this requirement? (Choose two.)

A.

Use System for Cross-domain Identity Management (SCIM).

B.

Use Manual Entries.

C.

Use Directory Importer.

D.

Use Bulk Upload with a CSV file.

Full Access
Question # 10

Your small company of 10 people wants to deploy the Netskope client to all company users without requiring users to be imported using Active Directory, LDAP, or an IdP.

A.

Deploy the Netskope client using SCCM.

B.

Deploy the Netskope client using JAMF.

C.

Deploy the Netskope client using Microsoft GPO.

D.

Deploy the Netskope client using an email invitation.

Full Access
Question # 11

Your company asks you to use Netskope to integrate with Endpoint Detection and Response (EDR) vendors such as CrowdStrike. In this scenario, what is a requirement for a successful Integration and sharing of threat data?

A.

API Client ID

B.

device classification

C.

custom log parser

D.

user endpoint

Full Access
Question # 12

You are given an MD5 hash of a file suspected to be malware by your security incident response team. They ask you to offer insight into who has encountered this file and from where was the threat initiated. In which two Skope IT events tables would you search to find the answers to these questions? (Choose two.)

A.

Application Events

B.

Network Events

C.

Alerts

D.

Page Events

Full Access
Question # 13

You want to prevent a document stored in Google Drive from being shared externally with a public link. What would you configure in Netskope to satisfy this requirement?

A.

Threat Protection policy

B.

API Data Protection policy

C.

Real-time Protection policy

D.

Quarantine

Full Access
Question # 14

Your company asks you to use Netskope to integrate with Endpoint Detection and Response (EDR) vendors such as Crowdstrike.

Which two requirements are needed for a successful integration and sharing of threat data? (Choose two.)

A.

Remediation profile

B.

Device classification

C.

API Client ID

D.

Custom log parser

Full Access
Question # 15

What are three methods to deploy a Netskope client? (Choose three.)

A.

Deploy Netskope client using SCCM.

B.

Deploy Netskope client using REST API v2.

C.

Deploy Netskope client using email invite.

D.

Deploy Netskope client using REST API v1.

E.

Deploy Netskope client using IdP.

Full Access
Question # 16

Your team is asked to investigate ten Netskope DLP incidents. You want to assign these incidents among different team members.

A.

Use your ticketing tool.

B.

Use the Forensic Incident workflow.

C.

Use the DLP Incident workflow.

D.

Use the Quarantine Incident workflow.

Full Access
Question # 17

To which three event types does Netskope's REST API v2 provide access? (Choose three.)

A.

application

B.

alert

C.

client

D.

infrastructure

E.

user

Full Access
Question # 18

Your customer implements Netskope Secure Web Gateway to secure all Web traffic. While they have created policies to block certain categories, there are many new sites available dally that are not yet categorized. The customer's users need quick access and cannot wait to put in a request to gain access requiring a policy change or have the site's category changed.

To solve this problem, which Netskope feature would provide quick, safe access to these types of sites?

A.

Netskope Cloud Firewall (CFW)

B.

Netskope Remote Browser Isolation (RBI)

C.

Netskope Continuous Security Assessment (CSA)

D.

Netskope SaaS Security Posture Management (SSPM)

Full Access
Question # 19

Your company wants to deploy Netskope using a tunnel because you have a mixture of device operating systems. You also do not want to enable encryption because you want to maximize bandwidth.

A.

explicit proxy

B.

IPsec

C.

proxy chaining

D.

GRE

Full Access
Question # 20

Your learn is asked to Investigate which of the Netskope DLP policies are creating the most incidents. In this scenario, which two statements are true? (Choose two.)

A.

The Skope IT Applications tab will list the top five DLP policies.

B.

You can see the top Ave DLP policies triggered using the Analyze feature

C.

You can create a report using Reporting or Advanced Analytics.

D.

The Skope IT Alerts tab will list the top five DLP policies.

Full Access
Question # 21

Review the exhibit.

You are asked to restrict users from accessing YouTube content tagged as Sport. You created the required real-time policy; however, users can still access the content

Referring to the exhibit, what is the problem?

A.

The website is in a steering policy exception.

B.

The policy changes have not been applied.

C.

The YouTube content cannot be controlled.

D.

The traffic matched a Do Not Decrypt policy

Full Access
Question # 22

Your customer has some managed Windows-based endpoints where they cannot add any clients or agents. For their users to have secure access to their SaaS application, you suggest that the customer use Netskope's Explicit Proxy.

Which two configurations are supported for this use case? (Choose two.)

A.

Endpoints can be configured to directly use the Netskope proxy.

B.

Endpoints must have separate steering configurations in the tenant settings.

C.

Endpoints must be configured in the device section of the tenant to interoperate with all proxies.

D.

Endpoints can be configured to use a Proxy Auto Configuration (PAC) file.

Full Access
Question # 23

You are asked to grant access for a group of users to an application using NPA. So far, you have created and deployed the publisher and created a private application using the Netskope console.

Which two steps must also be completed to enable your users access to the application? (Choose two.)

A.

Create an inbound firewall rule to permit network traffic to reach the publisher

B.

Enable traffic steering for private applications.

C.

Create a Real-time Protection policy that allows your users to access the application.

D.

Define an application instance name in Skope IT.

Full Access
Question # 24

Your company has many users that are remote and travel often. You want to provide the greatest visibility into their activities, even while traveling. Using Netskope. which deployment method would be used in this scenario?

A.

Use proxy chaining.

B.

Use a Netskope client.

C.

Use an IPsec tunnel.

D.

Use a GRE tunnel.

Full Access
Question # 25

A customer wants to deploy the Netskope client on all their employee laptops to protect all Web traffic when users are working from home. However, users are required to work from their local offices at least one day per week. Management requests that users returning to the office be able to transparently leverage the local security stack without any user intervention.

Which two statements are correct in this scenario? (Choose two.)

A.

You must enable On-premises Detection in the client configuration.

B.

You must allow users to unenroll In the client configuration.

C.

You must disable Dynamic Steering in the traffic steering profile.

D.

You must configure IPsec/GRE tunnels on the local network to steer traffic to Netskope.

Full Access
Question # 26

You created the Netskope application in your IdP for user provisioning and validated that the API Integration settings are correct and functional. However, you are not able to push the user groups from the IdP into your Netskope tenant.

A.

The IdP group contains active users, as well as one or more deactivated users.

B.

The IdP does not have Create User permissions.

C.

You do not have enough users assigned to the IdP group.

D.

You failed to push the IdP users before attempting to push the IdP groups.

Full Access
Question # 27

A company allows their users to access OneDrive on their managed laptops. It is against corporate policy to upload any documents to their personal OneDrive. The company needs to enforce this policy to protect their customer’s sensitive data.

What are two ways to enforce this policy? (Choose two.)

A.

Create DLP policies to block the upload of all the identified documents.

B.

Create DLP policies to allow document uploading only to the corporate OneDrive instance.

C.

Create a new application instance for the corporate OneDrive.

D.

Fingerprint all the documents to have a catalog of all the documents that the company needs to protect.

Full Access