Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Netskope Certified Cloud Security Administrator Exam Question and Answers

Netskope Certified Cloud Security Administrator Exam

Last Update May 8, 2024
Total Questions : 60

We are offering FREE NSK101 Netskope exam questions. All you do is to just go and sign up. Give your details, prepare NSK101 free exam questions and then go for complete pool of Netskope Certified Cloud Security Administrator Exam test questions that will help you more.

NSK101 pdf

NSK101 PDF

$35  $99.99
NSK101 Engine

NSK101 Testing Engine

$42  $119.99
NSK101 PDF + Engine

NSK101 PDF + Testing Engine

$56  $159.99
Questions 1

Which two statements are correct about DLP Incidents in the Netskope platform? (Choose two.)

Options:

A.  

An incident can be associated to one or more DLP policies.

B.  

An incident can have one or more DLP violations.

C.  

An incident can be assigned to one or more administrators.

D.  

An incident can be associated to one or more DLP rules.

Discussion 0
Questions 2

What are two uses for deploying a Netskope Virtual Appliance? (Choose two.)

Options:

A.  

as an endpoint for Netskope Private Access (NPA)

B.  

as a local reverse-proxy to secure a SaaS application

C.  

as a log parser to discover in-use cloud applications

D.  

as a Secure Forwarder to steer traffic

Discussion 0
Questions 3

Exhibit

Which portion of the interface shown in the exhibit allows an administrator to set severity, assign ownership, track progress, and perform forensic analysis with excerpts of violating content?

Options:

A.  

Skope IT-> Alerts

B.  

Incidents -> DLP

C.  

API-enabled Protection -> Inventory

D.  

Reports -> New Report

Discussion 0
Questions 4

When using an out-of-band API connection with your sanctioned cloud service, what are two capabilities available to the administrator? (Choose two.)

Options:

A.  

to quarantine malware

B.  

to find sensitive content

C.  

to block uploads

D.  

to allow real-time access

Discussion 0
Questions 5

What are two characteristics of Netskope's Private Access Solution? (Choose two.)

Options:

A.  

It provides protection for private applications.

B.  

It provides access to private applications.

C.  

It acts as a cloud-based firewall.

D.  

It requires on-premises hardware.

Discussion 0
Questions 6

You have an issue with the Netskope client connecting to the tenant.

In this scenario, what are two ways to collect the logs from the client machine? (Choose two.)

Options:

A.  

from the Netskope client Ul About page

B.  

from the command line using the nsdiag command

C.  

from the Netskope client system tray icon

D.  

from the Netskope client Ul Configuration page

Discussion 0
Questions 7

You are creating a real-time policy for cloud applications.

In addition to users, groups, and organizational units, which two source criteria would support this scenario? (Choose two.)

Options:

A.  

protocol version

B.  

access method

C.  

browser version

D.  

device classification

Discussion 0
Questions 8

Why would you want to define an App Instance?

Options:

A.  

to create an API Data Protection Policy for a personal Box instance

B.  

to differentiate between an enterprise Google Drive instance vs. a personal Google Drive instance

C.  

to enable the instance_id attribute in the advanced search field when using query mode

D.  

to differentiate between an enterprise Google Drive instance vs. an enterprise Box instance

Discussion 0
Questions 9

You need to create a service request ticket for a client-related issue using the Netskope client Ul. In this scenario, you generate the client logs by right-clicking on the system tray icon and choosing

Options:

A.  

Save logs

B.  

Configuration

C.  

Troubleshoot

D.  

Help

Discussion 0
Questions 10

You want to use an out-of-band API connection into your sanctioned Microsoft 365 OneDrive for Business application to find sensitive content, enforce near real-time policy controls, and quarantine malware.

In this scenario, which primary function in the Netskope platform would you use to connect your application to Netskope?

Options:

A.  

DLP forensics

B.  

Risk Insights

C.  

laaS API-enabled Protection

D.  

SaaS API-enabled Protection

Discussion 0
Questions 11

Which three technologies describe the primary cloud service models as defined by the National Institute of Standards and Technology (NIST)? (Choose three.)

Options:

A.  

Cloud Service Provider (CSP)

B.  

Identity as a Service (IDaaS)

C.  

Platform as a Service (PaaS)

D.  

Software as a Service (SaaS)

E.  

Infrastructure as a Service (laaS)

Discussion 0
Questions 12

What are two fundamental differences between the inline and API implementation of the Netskope platform? (Choose two.)

Options:

A.  

The API implementation can be used with both sanctioned and unsanctioned applications.

B.  

The API implementation can only be used with sanctioned applications.

C.  

The inline implementation can effectively block a transaction in both sanctioned and unsanctioned applications.

D.  

The inline implementation can only effectively block a transaction in sanctioned applications.

Discussion 0
Questions 13

You investigate a suspected malware incident and confirm that it was a false alarm.

Options:

A.  

In this scenario, how would you prevent the same file from triggering another incident?

B.  

Quarantine the file. Look up the hash at the VirusTotal website.

C.  

Export the packet capture to a pcap file.

D.  

Add the hash to the file filter.

Discussion 0
Questions 14

Exhibit

A user is connected to a cloud application through Netskope's proxy.

In this scenario, what information is available at Skope IT? (Choose three.)

Options:

A.  

username. device location

B.  

destination IP. OS patch version

C.  

account instance, URL category

D.  

user activity, cloud app risk rating

E.  

file version, shared folder

Discussion 0
Questions 15

Which two cloud security and infrastructure enablement technologies does Secure Access Service Edge (SASE) combine into its unified platform? (Choose two.)

Options:

A.  

Distributed Denial of Service Protection (DDoS)

B.  

Zero Trust Network Access (ZTNA)

C.  

Cloud Access Security Broker (CASB)

D.  

Unified Threat Management (UTM)

Discussion 0
Questions 16

You want to take into account some recent adjustments to CCI scoring that were made in your Netskope tenant.

In this scenario, which two CCI aspects in the Ul would be used in a real-time protection policy? (Choose two.)

Options:

A.  

App Tag

B.  

CCL

C.  

App Score

D.  

GDPR Readiness

Discussion 0
Questions 17

In the Skope IT interface, which two event tables would be used to label a cloud application instance? (Choose two.)

Options:

A.  

Network Events

B.  

Page Events

C.  

Application Events

D.  

Alerts

Discussion 0
Questions 18

When would an administrator need to use a tombstone file?

Options:

A.  

You use a tombstone file when a policy causes a file download to be blocked.

B.  

You use a tombstone file when a policy causes a publicly shared file to be encrypted.

C.  

You use a tombstone file when the policy causes a file to be moved to quarantine.

D.  

You use a tombstone file when a policy causes a file to be moved to legal hold.

Discussion 0