Which deployment model would you use to discover this data?

Your department is asked to report on GDPR data publicly exposed in Microsoft 365, Salesforce. and Slack-sanctioned cloud applications. Which deployment model would you use to discover this data?A . reverse proxyB . on-premises applianceC . API-enabled protectionD . inline protectionView AnswerAnswer: C Explanation: To discover GDPR data publicly exposed...

September 21, 2024No CommentsREAD MORE +

Which two traffic steering configurations are supported by Netskope? (Choose two.)

Which two traffic steering configurations are supported by Netskope? (Choose two.)A . browser isolation traffic onlyB . cloud applications onlyC . all Web traffic including cloud applicationsD . Web traffic onlyView AnswerAnswer: B, C Explanation: The two traffic steering configurations that are supported by Netskope are cloud applications only and...

September 20, 2024No CommentsREAD MORE +

What are two reasons why legacy solutions, such as on-premises firewalls and proxies, fail to secure the data and data access compared to Netskope Secure Web Gateway? (Choose two.)

What are two reasons why legacy solutions, such as on-premises firewalls and proxies, fail to secure the data and data access compared to Netskope Secure Web Gateway? (Choose two.)A . Legacy solutions are unable to see the user who is trying to access the application.B . The applications where the...

September 20, 2024No CommentsREAD MORE +

What are three probable causes for this issue?

A company is attempting to steer traffic to Netskope using GRE tunnels. They notice that after the initial configuration, users cannot access external websites from their browsers. What are three probable causes for this issue? (Choose three.)A . The pre-shared key for the GRE tunnel is incorrect.B . The configured...

September 18, 2024No CommentsREAD MORE +

In this scenario, which statement is correct?

There is a DLP violation on a file in your sanctioned Google Drive instance. The file is in a deleted state. You need to locate information pertaining to this DLP violation using Netskope. In this scenario, which statement is correct?A . You can find DLP violations under Forensic profiles.B ....

September 17, 2024No CommentsREAD MORE +

Which two actions would help you accomplish this task while allowing the user to work?

You are required to mitigate malicious scripts from being downloaded into your corporate devices every time a user goes to a website. Users need to access websites from a variety of categories, including new websites. Which two actions would help you accomplish this task while allowing the user to work?...

September 13, 2024No CommentsREAD MORE +

Which three technologies describe the primary cloud service models as defined by the National Institute of Standards and Technology (NIST)? (Choose three.)

Which three technologies describe the primary cloud service models as defined by the National Institute of Standards and Technology (NIST)? (Choose three.)A . Cloud Service Provider (CSP)B . Identity as a Service (IDaaS)C . Platform as a Service (PaaS)D . Software as a Service (SaaS)E . Infrastructure as a Service...

September 12, 2024No CommentsREAD MORE +

What are two use cases for Netskope's DLP solution? (Choose two.)

What are two use cases for Netskope's DLP solution? (Choose two.)A . to stop unintentional data movementB . to detect malware in files before they are uploaded to a cloud applicationC . to detect sensitive data in password protected filesD . to ensure regulatory complianceView AnswerAnswer: A, D Explanation: Netskope’s...

September 12, 2024No CommentsREAD MORE +

In this scenario, which two deployment methods would match your inline use case?

You want to enable Netskope to gain visibility into your users' cloud application activities in an inline mode. In this scenario, which two deployment methods would match your inline use case? (Choose two.)A . Use a forward proxy.B . Use an API connectorC . Use a log parser.D . Use...

September 11, 2024No CommentsREAD MORE +