Free NSK100 Exam Braindumps (page: 5)

Page 4 of 16

You are required to mitigate malicious scripts from being downloaded into your corporate devices every time a user goes to a website. Users need to access websites from a variety of categories, including new websites.

Which two actions would help you accomplish this task while allowing the user to work? (Choose two.)

  1. Allow the user to browse uncategorized domains but restrict edit activities.
  2. Block malware detected on download activity for all remaining categories.
  3. Block known bad websites and enable RBI to uncategorized domains.
  4. Allow a limited amount of domains and block everything else.

Answer(s): B,D



A customer asks you to create several real-time policies. Policy A generates alerts when any user downloads, uploads, or shares files on a cloud storage application. Policy B blocks users from downloading files from any operating system (OS) other than Mac or Windows for cloud storage. In this case, policy A is least restrictive and policy B is more restrictive.

Which statement is correct in this scenario?

  1. Policy A is implemented before policy B.
  2. Policy B is implemented before policy A.
  3. The policy order is not important; policies are independent of each other.
  4. These two policies would actually not work together.

Answer(s): B



A company is attempting to steer traffic to Netskope using GRE tunnels. They notice that after the initial configuration, users cannot access external websites from their browsers.

What are three probable causes for this issue? (Choose three.)

  1. The pre-shared key for the GRE tunnel is incorrect.
  2. The configured GRE peer in the Netskope platform is incorrect.
  3. The corporate firewall might be blocking GRE traffic.
  4. The route map was applied to the wrong router interface.
  5. Netskope does not support GRE tunnels.

Answer(s): A,B,E



What are two fundamental differences between the inline and API implementation of the Netskope platform? (Choose two.)

  1. The API implementation can be used with both sanctioned and unsanctioned applications.
  2. The API implementation can only be used with sanctioned applications.
  3. The inline implementation can effectively block a transaction in both sanctioned and unsanctioned applications.
  4. The inline implementation can only effectively block a transaction in sanctioned applications.

Answer(s): A,C






Post your Comments and Discuss Netskope NSK100 exam with other Community members:

NSK100 Discussions & Posts