Big Cyber Monday Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Netskope NSK300 Netskope Certified Cloud Security Architect Exam Exam Practice Test

Demo: 20 questions
Total 68 questions

Netskope Certified Cloud Security Architect Exam Questions and Answers

Question 1

Your company has a large number of medical forms that are allowed to exit the company when they are blank. If the forms contain sensitive data, the forms must not leave any company data centers, managed devices, or approved cloud environments. You want to create DLP rules for these forms.

Which first step should you take to protect these forms?

Options:

A.

Use Netskope Secure Forwarder to create EDM hashes of all forms.

B.

Use Netskope Secure Forwarder to create an MIP tag for all forms.

C.

Use Netskope Secure Forwarder to create fingerprints of all forms.

D.

Use Netskope Secure Forwarder to create an ML Model of all forms

Question 2

You are implementing a solution to deploy Netskope for machine traffic in an AWS account across multiple VPCs. You want to deploy the least amount of tunnels while providing connectivity for all VPCs.

How would you accomplish this task?

Options:

A.

Use IPsec tunnels from the AWS Virtual Private Gateway.

B.

Use GRE tunnels from the AWS Transit Gateway.

C.

Use GRE tunnels from the AWS Virtual Private Gateway

D.

Use IPsec tunnels from the AWS Transit Gateway.

Question 3

Review the exhibit.

You installed Directory Importer and configured it to import specific groups ot users into your Netskope tenant as shown in the exhibit. One hour after a new user has been added to the domain, the user still has not been provisioned to Netskope.

What are three potential reasons for this failure? (Choose three.)

Options:

A.

Directory Importer does not support ongoing user syncs; you must manually provision the user.

B.

The server that the Directory Importer is installed on is unable to reach Netskope's add-on endpoint.

C.

The user is not a member of the group specified as a filter

D.

Active Directory integration is not enabled on your tenant.

E.

The default collection interval is 180 minutes, therefore a sync may not have run yet.

Question 4

Users in your network are attempting to reach a website that has a self-signed certificate using a GRE tunnel to Netskope. They are currently being blocked by Netskope with an SSL error. How would you allow this traffic?

Options:

A.

Configure a Do Not Decrypt SSL Decryption rule to allow traffic to pass.

B.

Configure a Real-time Protection policy with the action set to Allow.

C.

Set the No SNI setting in Netskope to Bypass.

D.

Ensure that the users add the self-signed certificate to their local certificate store.

Question 5

You are architecting a Netskope steering configuration for devices that are not owned by the organization The users could be either on-premises or off-premises and the architecture requires that traffic destined to the company's instance of Microsoft 365 be steered to Netskope for inspection.

How would you achieve this scenario from a steering perspective?

Options:

A.

Use IPsec and GRE tunnels.

B.

Use reverse proxy.

C.

Use explicit proxy and the Netskope Client

D.

Use DPoP and Secure Forwarder

Question 6

You are implementing Netskope Cloud Exchange in your company lo include functionality provided by third-party partners. What would be a reason for using Netskope Cloud Risk Exchange in this scenario?

Options:

A.

to ingest events and alerts from a Netskope tenant

B.

to feed SOC with detection and response services

C.

to map multiple scores to a normalized range

D.

to automate service tickets from alerts of interest

Question 7

You have deployed Netskope to all users of the organization and you are now ready to begin ingesting all events, alerts, and Web transactions into your SIEM as a part of your requirements.

What are three ways in which you would accomplish this task? (Choose three.)

Options:

A.

Use custom API calls to ingest to a data lake and then into your SIEM.

B.

Use the Netskope Publisher to a stream syslog to your SIEM.

C.

Use syslog directly to Splunk.

D.

Use Cloud Log Shipper to an IaaS storage repository and then into your SIEM.

Question 8

You have enabled CASB traffic steering using the Netskope Client, but have not yet enabled a Real-time Protection policy. What is the default behavior of the traffic in this scenario?

Options:

A.

Traffic will be blocked and logged.

B.

Traffic will be allowed and logged.

C.

Traffic will be blocked, but not logged.

D.

Traffic will be allowed, but not logged.

Question 9

Your CISO asks that you to provide a report with a visual representation of the top 10 applications (by number of objects) and their risk score. As the administrator, you decide to use a Sankey visualization in Advanced Analytics to represent the data in an efficient manner.

In this scenario, which two field types are required to produce a Sankey Tile in your report? {Choose two.)

Options:

A.

Dimension

B.

Measure

C.

Pivot Ranks

D.

Period of Type

Question 10

You are consuming Audit Reports as part of a Salesforce API integration. Someone has made a change to a Salesforce account record field that should not have been made and you are asked to venfy the previous value of the structured data field. You have the approximate date and time of the change, user information, and the new field value.

How would you accomplish this task?

Options:

A.

Create a classic report and apply a query that filters on the changed field value.

B.

Use the Application Events Data Collection within Advanced Analytics and filter on the changed field value.

C.

Query Skope IT Page Events and look for the specific Page URL that was called under the Application section.

D.

Query Skope IT for an Access Method of API Connector and search Application Event Details for the Old Value field using the User details and Edit Activity.

Question 11

A company wants to capture and maintain sensitive Pll data in a relational database to help their customers. There are many employees and contractors that need access to sensitive customer data to perform their duties The company wants to prevent the exfiltration of sensitive customer data by their employees and contractors.

In this scenario. what would satisfy this requirement?

Options:

A.

fingerprinting

B.

exact data match

C.

regular expression

D.

machine learning

Question 12

You are attempting to merge two Advanced Analytics reports with DLP incidents: Report A with 3000 rows and Report B with 6000 rows. Once merged, you notice that the merged report is missing a significant number of rows.

What is causing this behavior?

Options:

A.

Netskope automatically deduplicates data in merged reports.

B.

Missing data is due to viewing limits.

C.

Filters are applied differently to dimensions and measures

D.

Visualizations have a system limit of 5000 rows.

Question 13

You recently began deploying Netskope at your company. You are steering all traffic, but you discover that the Real-time Protection policies you created to protect Microsoft OneDrive are not being enforced.

Which default setting in the Ul would you change to solve this problem?

Options:

A.

Disable the default Microsoft appsuite SSL rule.

B.

Disable the default certificate-pinned application

C.

Remove the default steering exception for domains.

D.

Remove the default steering exception for Cloud Storage.

Question 14

A company's architecture includes a server subnet that is logically isolated from the rest of the network with no Internet access, no default gateway, and no access to DNS. New resources can only be provisioned on virtual resources in that segment and there is a firewall that is tunnel-capable securing the perimeter of the segment. The only requirement is to have content filtering for any server that might access the Internet using a browser.

Which two Netskope deployment methods would achieve this requirement? (Choose two.)

Options:

A.

Deploy a mobile profile on the servers.

B.

Deploy Data Plane on Premises (DPoP) with a proxy configuration on the servers.

C.

Deploy IPsec or GRE tunnels in the segment to steer traffic from the servers to Netskope.

D.

Install the Netskope Client on the servers

Question 15

Your company purchased Netskope's Next Gen Secure Web Gateway You are working with your network administrator to create GRE tunnels to send traffic to Netskope Your network administrator has set up the tunnel, keepalives. and a policy-based route on your corporate router to send all HTTP and HTTPS traffic to Netskope. You want to validate that the tunnel is configured correctly and that traffic is flowing.

In this scenario, which two statements are correct? (Choose two.)

Options:

A.

You can use your local router or network device to verify that keepalives are being received and traffic is flowing to Netskope.

B.

You must use your own monitoring tools to verify that the tunnel is up.

C.

You can verify that the tunnel is up and receiving traffic in the Netskope Ul under Settings > Security Cloud Platform > GRE.

D.

You can verify that the tunnel is up in the Netskope Trust portal at https://trust netskope.com/.

Question 16

You do not want a scheduled Advanced Analytics dashboard to be automatically updated when Netskope makes improvements to that dashboard. In this scenario, what would you do to retain the original dashboard?

Options:

A.

Create a new dashboard from scratch that mimics the Netskope dashboard you want to use.

B.

Copy the dashboard into your Group or Personal folders and schedule from these folders.

C.

Ask Netskope Support to provide the dashboard and import into your Personal folder.

D.

Download the dashboard you want and Import from File into your Group or Personal folder.

Question 17

You jus! deployed and registered an NPA publisher for your first private application and need to provide access to this application for the Human Resources (HR) users group only. How would you accomplish this task?

Options:

A.

1. Enable private app steering in the Steering Configuration assigned to the HR group.

2. Create a new Private App.

3. Create a new Real-time Protection policy as follows;

Source = HR user group Destination = Private App Action = Allow

B.

1. Create a new private app and assign it to the HR user group.

2. Create a new Real-time Protection policy as follows:

Source = HR user group Destination = Private App Action = Allow.

C.

1. Enable private app steering in Tenant Steering Configuration.

2. Create a new private app and assign it to the HR user group.

D.

1. Enable private app steering in the Steering Configuration assigned to the HR group.

2. Create a new private app and assign it to the HR user group

3. Create a new Real-time Protection policy as follows:

Source = HR user group Destination = Private App Action = Allow

Question 18

You have an NG-SWG customer that currently steers all Web traffic to Netskope using the Netskope Client. They have identified one new native application on Windows devices that is a certificate-pinned application. Users are not able to access the application due to certificate pinning. The customer wants to configure the Netskope Client so that the traffic from the application is steered to Netskope and the application works as expected.

Which two methods would satisfy the requirements? (Choose two.)

Options:

A.

Bypass traffic using the bypass action in the Real-time Protection policy.

B.

Configure the SSL Do Not Decrypt policy to not decrypt traffic for domains used by the native application.

C.

Configure domain exceptions in the steering configuration for the domains used by the native application.

D.

Tunnel traffic to Netskope and bypass traffic inspection at the Netskope proxy.

Question 19

Review the exhibit.

You created an SSL decryption policy to bypass the inspection of financial and accounting Web categories. However, you still see banking websites being inspected.

Referring to the exhibit, what are two possible causes of this behavior? (Choose two.)

Options:

A.

The policy is in a "disabled" state.

B.

An incorrect category has been selected

C.

The policy is in a "pending changes" state.

D.

An incorrect action has been specified.

Question 20

You are asked to ensure that a Web application your company uses is both reachable and decrypted by Netskope. This application is served using HTTPS on port 6443. Netskope is configured with a default Cloud Firewall configuration and the steering configuration is set for All Traffic.

Which statement is correct in this scenario?

Options:

A.

Create a Firewall App in Netskope along with the corresponding Real-time Protection policy to allow the traffic.

B.

Nothing is required since Netskope is steering all traffic.

C.

Enable "Steer non-standard ports" in the steering configuration and add the domain and port as a new non-standard port

D.

Enable "Steer non-standard ports" in the steering configuration and create a corresponding Real-time Protection policy to allow the traffic

Demo: 20 questions
Total 68 questions