Netskope NSK200 - Netskope Certified Cloud Security Integrator (NCCSI) Exam

Page:    1 / 13   
Total 61 questions

To which three event types does Netskope's REST API v2 provide access? (Choose three.)

  • A. application
  • B. alert
  • C. client
  • D. infrastructure
  • E. user


Answer : ABE


Review the exhibit.
Your company uses Google as the corporate collaboration suite; however, corporate policy restricts the use of personal Google services. The exhibit provides a partially completed policy to ensure that users cannot login to their personal account.
What should be added to achieve the desired outcome in this scenario?

  • A. Google Gmail app
  • B. User Constraint
  • C. DLP profile
  • D. Device classification


Answer : B

You have deployed a development Web server on a public hosting service using self-signed SSL certificates. After some troubleshooting, you determined that when the Netskope client is enabled, you are unable to access the Web server over SSL. The default Netskope tenant steering configuration is in place.
In this scenario, which two settings are causing this behavior? (Choose two.)

  • A. SSL pinned certificates are blocked.
  • B. Untrusted root certificates are blocked.
  • C. Incomplete certificate trust chains are blocked.
  • D. Self-signed server certificates are blocked.


Answer : BD

An engineering firm is using Netskope DLP to identify and block sensitive documents, including schematics and drawings. Lately, they have identified that when these documents are blocked, certain employees may be taking screenshots and uploading them. They want to block any screenshots from being uploaded.
Which feature would you use to satisfy this requirement?

  • A. exact data match (EDM)
  • B. document fingerprinting
  • C. ML image classifier
  • D. optical character recognition (OCR)


Answer : C


Review the exhibit.
You are at the Malware Incident page. A virus was detected by the Netskope Heuristics Engine. Your security team has confirmed that the virus was a test data file. You want to allow the security team to use this file.
Referring to the exhibit, which two statements are correct? (Choose two.)

  • A. Click the "Add To File Filter" button to add the IOC to a file list.
  • B. Contact the CrowdStrike administrator to have the file marked as safe.
  • C. Click the "Lookup VirusTotal" button to verify if this IOC is a false positive.
  • D. Create a malware detection profile and update the file hash list with the IOC.


Answer : AC

Page:    1 / 13   
Total 61 questions