Netskope NSK100 - Netskope Certified Cloud Security Administrator Exam

Page:    1 / 12   
Total 60 questions

A customer wants to detect misconfigurations in their AWS cloud instances.
In this scenario, which Netskope feature would you recommend to the customer?

  • A. Netskope Secure Web Gateway (SWG)
  • B. Netskope Cloud Security Posture Management (CSPM)
  • C. Netskope Advanced DLP and Threat Protection
  • D. Netskope SaaS Security Posture Management (SSPM)


Answer : B

You just deployed the Netskope client in Web mode and several users mention that their messenger application is no longer working. Although you have a specific real-time policy that allows this application, upon further investigation you discover that it is using proprietary encryption. You need to permit access to all the users and maintain some visibility.
In this scenario, which configuration change would accomplish this task?

  • A. Change the real-time policy to block the messenger application.
  • B. Create a new custom cloud application using the custom connector that can be used in the real-time policy.
  • C. Add a policy in the SSL decryption section to bypass the messenger domain(s).
  • D. Edit the steering configuration and add a steering exception for the messenger application.


Answer : C

What are two fundamental differences between the inline and API implementation of the Netskope platform? (Choose two.)

  • A. The API implementation can be used with both sanctioned and unsanctioned applications.
  • B. The API implementation can only be used with sanctioned applications.
  • C. The inline implementation can effectively block a transaction in both sanctioned and unsanctioned applications.
  • D. The inline implementation can only effectively block a transaction in sanctioned applications.


Answer : BC

A customer asks you to create several real-time policies. Policy A generates alerts when any user downloads, uploads, or shares files on a cloud storage application. Policy B blocks users from downloading files from any operating system (OS) other than Mac or Windows for cloud storage. In this case, policy A is least restrictive and policy B is more restrictive.
Which statement is correct in this scenario?

  • A. Policy A is implemented before policy B.
  • B. Policy B is implemented before policy A.
  • C. The policy order is not important; policies are independent of each other.
  • D. These two policies would actually not work together.


Answer : B

What are two CASB inline interception use cases? (Choose two.)

  • A. blocking file uploads to a personal Box account
  • B. running a retroactive scan for data at rest in Google Drive
  • C. using the Netskope steering client to provide user alerts when sensitive information is posted in Slack
  • D. scanning Dropbox for credit card information


Answer : AC

Page:    1 / 12   
Total 60 questions