Netskope NSK101 Netskope Certified Cloud Security Administrator (NCCSA) Online Training
Netskope NSK101 Online Training
The questions for NSK101 were last updated at Nov 23,2024.
- Exam Code: NSK101
- Exam Name: Netskope Certified Cloud Security Administrator (NCCSA)
- Certification Provider: Netskope
- Latest update: Nov 23,2024
According to Netskope. what are two preferred methods to report a URL miscategorization? (Choose two.)
- A . Use www.netskope.com/url-lookup.
- B . Use the URL Lookup page in the dashboard.
- C . Email [email protected].
- D . Tag Netskope on Twitter.
What is the limitation of using a legacy proxy compared to Netskope’s solution?
- A . Netskope architecture requires on-premises components.
- B . Legacy solutions offer higher performance and scalability for corporate and remote users.
- C . Legacy on-premises solutions fail to provide protection for traffic from on-premises users.
- D . To enforce policies, traffic needs to traverse back through a customer’s on-premises security stack.
You are creating a real-time policy for cloud applications.
In addition to users, groups, and organizational units, which two source criteria would support this scenario? (Choose two.)
- A . protocol version
- B . access method
- C . browser version
- D . device classification
What are two reasons why legacy solutions, such as on-premises firewalls and proxies, fail to secure the data and data access compared to Netskope Secure Web Gateway? (Choose two.)
- A . Legacy solutions are unable to see the user who is trying to access the application.
- B . The applications where the data resides are no longer in one central location.
- C . Legacy solutions do not meet compliance standards.
- D . The users accessing this data are not in one central place.
There is a DLP violation on a file in your sanctioned Google Drive instance. The file is in a deleted state. You need to locate information pertaining to this DLP violation using Netskope.
In this scenario, which statement is correct?
- A . You can find DLP violations under Forensic profiles.
- B . DLP incidents for a file are not visible when the file is deleted.
- C . You can find DLP violations under the Incidents dashboard.
- D . You must create a forensic profile so that an incident is created.
What are two CASB inline interception use cases? (Choose two.)
- A . blocking file uploads to a personal Box account
- B . running a retroactive scan for data at rest in Google Drive
- C . using the Netskope steering client to provide user alerts when sensitive information is posted in Slack
- D . scanning Dropbox for credit card information
You want to take into account some recent adjustments to CCI scoring that were made in your Netskope tenant.
In this scenario, which two CCI aspects in the Ul would be used in a real-time protection policy? (Choose two.)
- A . App Tag
- B . CCL
- C . App Score
- D . GDPR Readiness
You are working with traffic from applications with pinned certificates. In this scenario, which statement is correct?
- A . An exception should be added to the steering configuration.
- B . The domains used by certificate-pinned applications should be added to the authentication bypass list.
- C . Traffic with pinned certificates should be blocked.
- D . The domains used by applications with pinned certificates should be allowed in an inline policy.
Which two traffic steering configurations are supported by Netskope? (Choose two.)
- A . browser isolation traffic only
- B . cloud applications only
- C . all Web traffic including cloud applications
- D . Web traffic only
Which three technologies describe the primary cloud service models as defined by the National Institute of Standards and Technology (NIST)? (Choose three.)
- A . Cloud Service Provider (CSP)
- B . Identity as a Service (IDaaS)
- C . Platform as a Service (PaaS)
- D . Software as a Service (SaaS)
- E . Infrastructure as a Service (laaS)