In which order should the policies be placed in this scenario?

You want customers to configure Real-time Protection policies.

In which order should the policies be placed in this scenario?
A . Threat, CASB, RBI, Web
B . RBI, CASB, Web, Threat
C . Threat, RBI, CASB, Web
D . CASB, RBI, Threat, Web

Answer: B

Explanation:

When configuring Real-time Protection policies in Netskope, the recommended order is as follows: RBI (Risk-Based Index) Policies: These policies focus on risk assessment and prioritize actions based on risk scores. They help identify high-risk activities and users.

CASB (Cloud Access Security Broker) Policies: These policies address cloud-specific security requirements, such as controlling access to cloud applications, enforcing data loss prevention (DLP) rules, and managing shadow IT.

Web Policies: These policies deal with web traffic, including URL filtering, web categories, and threat prevention.

Threat Policies: These policies focus on detecting and preventing threats, such as malware, phishing, and malicious URLs.

Placing the policies in this order ensures that risk assessment and cloud-specific controls are applied before addressing web and threat-related issues.

Reference: Netskope Security Cloud Introductory Online Technical Training

Netskope Security Cloud Operation & Administration (NSCO&A) – Classroom Training

Netskope Certification Description

Netskope Architectural Advantage Features

Latest NSK300 Dumps Valid Version with 60 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments