In this scenario, what makes It possible for a mass update of the URL list in the Netskope platform?
Netskope is being used as a secure Web gateway. Your organization's URL list changes frequently. In this scenario, what makes It possible for a mass update of the URL list in the Netskope platform? A. REST API v2 B. Assertion Consumer Service URL C. Cloud Threat Exchange D. SCIM provisioningView...
What would you configure in Netskope to satisfy this requirement?
You want to prevent a document stored in Google Drive from being shared externally with a public link. What would you configure in Netskope to satisfy this requirement?A . Threat Protection policyB . API Data Protection policyC . Real-time Protection policyD . QuarantineView AnswerAnswer: B Explanation: To prevent a document...
In this scenario, which two steps must be completed to satisfy this requirement?
Recently your company implemented Zoom for collaboration purposes and you are attempting to inspect the traffic with Netskope. Your initial attempt reveals that you are not seeing traffic from the Zoom client that is used by all users. You must ensure that this traffic is visible to Netskope. In this...
What is the problem in this scenario?
Review the exhibit. You receive a service request from a user who indicates that their Netskope client is in a disabled state. The exhibit shows an excerpt (rom the affected client nsdebuglog.log. What is the problem in this scenario?A . User authentication failed during IdP-based enrollment.B . The Netskope client...
To which three event types does Netskope's REST API v2 provide access? (Choose three.)
To which three event types does Netskope's REST API v2 provide access? (Choose three.)A . applicationB . alertC . clientD . infrastructureE . userView AnswerAnswer: ABD Explanation: Netskope’s REST API v2 provides access to various event types via URI paths. The event types include application, alert, infrastructure, audit, incident, network,...
Which statement is true about this scenario when using the Netskope client?
You want to secure Microsoft Exchange and Gmail SMTP traffic for DLP using Netskope. Which statement is true about this scenario when using the Netskope client? A. Netskope can inspect outbound SMTP traffic for Microsoft Exchange and Gmail. B. Enable Cloud Firewall to Inspect Inbound SMTP traffic for Microsoft Exchange...
Which statement describes how Netskope's REST API, v1 and v2, handles authentication?
Which statement describes how Netskope's REST API, v1 and v2, handles authentication? A. Both REST API v1 and v2 require the use of tokens to make calls to the API B. Neither REST API v1 nor v2 require the use of tokens. C. REST API v2 requires the use of...
Which three access controls would you use in this scenario?
You are implementing tenant access security and governance controls for privileged users. You want to start with controls that are natively available within the Netskope Cloud Security Platform and do not require external or third-party integration. Which three access controls would you use in this scenario? (Choose three.)A . IP...
Which object would be selected when creating a Malware Detection profile?
Which object would be selected when creating a Malware Detection profile?A . DLP profileB . File profileC . Domain profileD . User profileView AnswerAnswer: B Explanation: A file profile is an object that contains a list of file hashes that can be used to create a malware detection profile. A...
What is the purpose of the file hash list in Netskope?
What is the purpose of the file hash list in Netskope?A . It configures blocklist and allowlist entries referenced in the custom Malware Detection profiles.B . It is used to allow and block URLs.C . It provides the file types that Netskope can inspect.D . It provides Client Threat Exploit...