Free NSK100 Exam Braindumps (page: 7)

Page 6 of 16

In the Skope IT interface, which two event tables would be used to label a cloud application instance? (Choose two.)

  1. Network Events
  2. Page Events
  3. Application Events
  4. Alerts

Answer(s): B,C



Your department is asked to report on GDPR data publicly exposed in Microsoft 365, Salesforce. and Slack-sanctioned cloud applications.
Which deployment model would you use to discover this data?

  1. reverse proxy
  2. on-premises appliance
  3. API-enabled protection
  4. inline protection

Answer(s): C



Which two technologies form a part of Netskope's Threat Protection module? (Choose two.)

  1. log parser
  2. DLP
  3. sandbox
  4. heuristics

Answer(s): C,D



You just deployed the Netskope client in Web mode and several users mention that their messenger application is no longer working. Although you have a specific real-time policy that allows this application, upon further investigation you discover that it is using proprietary encryption. You need to permit access to all the users and maintain some visibility.

In this scenario, which configuration change would accomplish this task?

  1. Change the real-time policy to block the messenger application.
  2. Create a new custom cloud application using the custom connector that can be used in the real- time policy.
  3. Add a policy in the SSL decryption section to bypass the messenger domain(s).
  4. Edit the steering configuration and add a steering exception for the messenger application.

Answer(s): A






Post your Comments and Discuss Netskope NSK100 exam with other Community members:

NSK100 Discussions & Posts