Free NSK100 Exam Braindumps (page: 2)

Page 1 of 16

You investigate a suspected malware incident and confirm that it was a false alarm.

  1. In this scenario, how would you prevent the same file from triggering another incident?
  2. Quarantine the file. Look up the hash at the VirusTotal website.
  3. Export the packet capture to a pcap file.
  4. Add the hash to the file filter.

Answer(s): C



Which two common security frameworks are used today to assess and validate a vendor's security practices? (Choose two.)

  1. Data Science Council of America
  2. Building Security in Maturity Model
  3. ISO 27001
  4. NIST Cybersecurity Framework

Answer(s): B,D



You have applied a DLP Profile to block all Personally Identifiable Information data uploads to Microsoft 365 OneDrive. DLP Alerts are not displayed and no OneDrive-related activities are displayed in the Skope IT App Events table.

In this scenario, what are two possible reasons for this issue? (Choose two.)

  1. The Cloud Storage category is in the Steering Configuration as an exception.
  2. The destination domain is excluded from decryption in the decryption policy.
  3. A Netskope POP is not in your local country and therefore DLP policies cannot be applied.
  4. DLP policies do not apply when using IPsec as a steering option.

Answer(s): B,D



A customer changes CCI scoring from the default objective score to another score. In this scenario, what would be a valid reason for making this change?

  1. The customer has discovered a new SaaS application that is not yet rated in the CCI database.
  2. The customer's organization places a higher business risk weight on vendors that claim ownership of their data.
  3. The customer wants to punish an application vendor for providing poor customer service.
  4. The customer's organization uses a SaaS application that is currently listed as "under research".

Answer(s): C






Post your Comments and Discuss Netskope NSK100 exam with other Community members:

NSK100 Discussions & Posts