In which order should the policies be placed in this scenario?
You want customers to configure Real-time Protection policies.
In which order should the policies be placed in this scenario?
A . Threat, CASB, RBI, Web
B . RBI, CASB, Web, Threat
C . Threat, RBI, CASB, Web
D . CASB, RBI, Threat, Web
Answer: B
Explanation:
When configuring Real-time Protection policies in Netskope, the recommended order is as follows: RBI (Risk-Based Index) Policies: These policies focus on risk assessment and prioritize actions based on risk scores. They help identify high-risk activities and users.
CASB (Cloud Access Security Broker) Policies: These policies address cloud-specific security requirements, such as controlling access to cloud applications, enforcing data loss prevention (DLP) rules, and managing shadow IT.
Web Policies: These policies deal with web traffic, including URL filtering, web categories, and threat prevention.
Threat Policies: These policies focus on detecting and preventing threats, such as malware, phishing, and malicious URLs.
Placing the policies in this order ensures that risk assessment and cloud-specific controls are applied before addressing web and threat-related issues.
Reference: Netskope Security Cloud Introductory Online Technical Training
Netskope Security Cloud Operation & Administration (NSCO&A) – Classroom Training
Netskope Certification Description
Netskope Architectural Advantage Features
Latest NSK300 Dumps Valid Version with 60 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund