Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Netskope NCCSI NSK200 Questions and answers with ValidTests

Exam NSK200 All Questions
Exam NSK200 Premium Access

View all detail and faqs for the NSK200 exam

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

You are configuring GRE tunnels from a Palo Alto Networks firewall to a Netskope tenant with the Netskope for Web license enabled. Your tunnel is up as seen from the Netskope dashboard. You are unable to ping hosts behind the Netskope gateway.

Which two statements are true about this scenario? (Choose two.)

Options:

A.

You need to call support to enable the GRE POP selection feature.

B.

Netskope only supports Web traffic through the tunnel.

C.

You can only ping the probe IP provided by Netskope.

D.

There is no client installed on the source hosts in your network.

Expert Solution
Questions # 2:

Your company wants to deploy Netskope using a tunnel because you have a mixture of device operating systems. You also do not want to enable encryption because you want to maximize bandwidth.

Options:

A.

explicit proxy

B.

IPsec

C.

proxy chaining

D.

GRE

Expert Solution
Questions # 3:

Your customer has deployed the Netskope client to secure their Web traffic. Recently, they have enabled Cloud Firewall (CFW) to secure all outbound traffic for their endpoints. Through a recent acquisition, they must secure all outbound traffic at several remote offices where they have access to the local security stack (routers and firewalls). They cannot install the Netskope client.

Options:

A.

They can configure Reverse Proxy integrated with their IdP.

B.

They can deploy Netskope’s DPOP to steer the targeted traffic to the Netskope Security Cloud.

C.

They can use IPsec and GRE tunnels with Cloud Firewall.

D.

They can secure the targeted outbound traffic using Netskope’s Cloud Threat Exchange (CTE).

Expert Solution
Questions # 4:

Your organization has a homegrown cloud application. You are required to monitor the activities that users perform on this cloud application such as logins, views, and downloaded files. Unfortunately, it seems Netskope is unable to detect these activities by default.

How would you accomplish this goal?

Options:

A.

Enable access to the application with Netskope Private Access.

B.

Ensure that the cloud application is added as a steering exception.

C.

Ensure that the application is added to the SSL decryption policy.

D.

Create a new cloud application definition using the Chrome extension.

Expert Solution
Questions # 5:

Your company has many users that are remote and travel often. You want to provide the greatest visibility into their activities, even while traveling. Using Netskope. which deployment method would be used in this scenario?

Options:

A.

Use proxy chaining.

B.

Use a Netskope client.

C.

Use an IPsec tunnel.

D.

Use a GRE tunnel.

Expert Solution
Questions # 6:

You are deploying a Netskope client in your corporate office network. You are aware of firewall or proxy rules that need to be modified to allow traffic.

Which two statements are true in this scenario? (Choose two.)

Options:

A.

You need to allow TLS 1.1 traffic to pass through the firewalls from the users' IP to all destinations.

B.

You must enable SSL decryption in the proxy to inspect the Netskope tunnel.

C.

It is recommended to allow UDP port 443 to the Netskope IP ranges to allow DTLS.

D.

You need to allow TCP port 443 to the Netskope IP ranges or domains.

Expert Solution
Questions # 7:

You have deployed a development Web server on a public hosting service using self-signed SSL certificates. After some troubleshooting, you determined that when the Netskope client is enabled, you are unable to access the Web server over SSL. The default Netskope tenant steering configuration is in place.

In this scenario, which two settings are causing this behavior? (Choose two.)

Options:

A.

SSL pinned certificates are blocked.

B.

Untrusted root certificates are blocked.

C.

Incomplete certificate trust chains are blocked.

D.

Self-signed server certificates are blocked.

Expert Solution
Questions # 8:

Your small company of 10 people wants to deploy the Netskope client to all company users without requiring users to be imported using Active Directory, LDAP, or an IdP.

Options:

A.

Deploy the Netskope client using SCCM.

B.

Deploy the Netskope client using JAMF.

C.

Deploy the Netskope client using Microsoft GPO.

D.

Deploy the Netskope client using an email invitation.

Expert Solution
Questions # 9:

You use Netskope to provide a default Malware Scan profile for use with your malware policies. Also, you want to create a custom malware detection profile.

In this scenario, what are two additional requirements to complete this task? (Choose two.)

Options:

A.

Add a custom hash list as an allowlist.

B.

Add a quarantine profile.

C.

Add a remediation profile.

D.

Add a custom hash list as a blocklist.

Expert Solution
Questions # 10:

You are using the Netskope DLP solution. You notice that valid credit card numbers in a file that you just uploaded to an unsanctioned cloud storage solution are not triggering a policy violation. You can see the Skope IT application events for this traffic but no DLP alerts.

Which statement is correct in this scenario?

Options:

A.

Netskope client is not enabled.

B.

You have set the severity threshold to a higher value.

C.

Netskope client is enabled, but API protection for the SaaS application is not configured.

D.

Credit card numbers are entered with a space or dash separator and not as a 16-digit consecutive number.

Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions