Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
 

Netskope NSK100 Exam Actual Questions

The questions for NSK100 were last updated on Nov. 10, 2024.
  • Viewing page 1 out of 15 pages.
  • Viewing questions 1-4 out of 60 questions

Topic 1 - Exam A

Question #1 Topic 1

A customer wants to detect misconfigurations in their AWS cloud instances.
In this scenario, which Netskope feature would you recommend to the customer?

  • A. Netskope Secure Web Gateway (SWG)
  • B. Netskope Cloud Security Posture Management (CSPM)
  • C. Netskope Advanced DLP and Threat Protection
  • D. Netskope SaaS Security Posture Management (SSPM)
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #2 Topic 1

You just deployed the Netskope client in Web mode and several users mention that their messenger application is no longer working. Although you have a specific real-time policy that allows this application, upon further investigation you discover that it is using proprietary encryption. You need to permit access to all the users and maintain some visibility.
In this scenario, which configuration change would accomplish this task?

  • A. Change the real-time policy to block the messenger application.
  • B. Create a new custom cloud application using the custom connector that can be used in the real-time policy.
  • C. Add a policy in the SSL decryption section to bypass the messenger domain(s).
  • D. Edit the steering configuration and add a steering exception for the messenger application.
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️

Question #3 Topic 1

What are two fundamental differences between the inline and API implementation of the Netskope platform? (Choose two.)

  • A. The API implementation can be used with both sanctioned and unsanctioned applications.
  • B. The API implementation can only be used with sanctioned applications.
  • C. The inline implementation can effectively block a transaction in both sanctioned and unsanctioned applications.
  • D. The inline implementation can only effectively block a transaction in sanctioned applications.
Reveal Solution Hide Solution   Discussion  

Correct Answer: BC 🗳️

Question #4 Topic 1

A customer asks you to create several real-time policies. Policy A generates alerts when any user downloads, uploads, or shares files on a cloud storage application. Policy B blocks users from downloading files from any operating system (OS) other than Mac or Windows for cloud storage. In this case, policy A is least restrictive and policy B is more restrictive.
Which statement is correct in this scenario?

  • A. Policy A is implemented before policy B.
  • B. Policy B is implemented before policy A.
  • C. The policy order is not important; policies are independent of each other.
  • D. These two policies would actually not work together.
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...