You are working with traffic from applications with pinned certificates. In this scenario, which statement is correct?
You are working with traffic from applications with pinned certificates. In this scenario, which statement is correct?
A . An exception should be added to the steering configuration.
B . The domains used by certificate-pinned applications should be added to the authentication bypass list.
C . Traffic with pinned certificates should be blocked.
D . The domains used by applications with pinned certificates should be allowed in an inline policy.
Answer: A
Explanation:
When working with traffic from applications with pinned certificates, you should add an exception to the steering configuration to bypass them. Pinned certificates are a security technique that prevents man-in-the-middle attacks by validating the server certificates against a hardcoded list of certificates in the application. If you try to intercept or inspect the traffic from such applications, they will reject the connection or display an error message. Therefore, you should add the domains used by certificate-pinned applications as exceptions in your steering configuration, so that they are not steered to Netskope for analysis and enforcement.
Reference: Certificate Pinned ApplicationsCreating a Steering Configuration
Latest NSK101 Dumps Valid Version with 60 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund