Free NSK101 Exam Braindumps (page: 11)

Page 11 of 34

Which two controls are covered by Netskope's security platform? (Choose two.)

  1. ZTNA
  2. VPN
  3. CASB
  4. EDR

Answer(s): A,C

Explanation:

Netskope's security platform covers two controls: ZTNA and CASB. ZTNA stands for Zero Trust Network Access, which is a solution that provides secure and granular access to private applications without exposing them to the internet or requiring VPNs. CASB stands for Cloud Access Security Broker, which is a solution that provides visibility and control over cloud services and web traffic, as well as data and threat protection for cloud users and devices.


Reference:

Netskope PlatformNetskope ZTNANetskope CASB



Which two statements are correct about DLP Incidents in the Netskope platform? (Choose two.)

  1. An incident can be associated to one or more DLP policies.
  2. An incident can have one or more DLP violations.
  3. An incident can be assigned to one or more administrators.
  4. An incident can be associated to one or more DLP rules.

Answer(s): B,D

Explanation:

Two statements that are correct about DLP Incidents in the Netskope platform are: An incident can have one or more DLP violations and an incident can be associated to one or more DLP rules. A DLP violation occurs when a file or object matches a DLP rule used in a DLP profile. A DLP rule defines the criteria for detecting sensitive data, such as keywords, regular expressions, fingerprints, machine learning classifiers, etc. A DLP profile is a collection of DLP rules that can be applied to a policy. An incident is a record of a file or object that triggered a DLP policy violation. An incident can have multiple violations if the file or object matches multiple DLP rules from different profiles. An incident can also be associated to multiple DLP rules if the file or object matches more than one rule from the same profile.


Reference:

About DLPDLP Profiles



Which two statements describe a website categorized as a domain generated algorithm (DGA)? (Choose two.)

  1. The website is used for domain registration.
  2. The domain contains malicious algorithms.
  3. The website is used to hide a command-and-control server.
  4. The domain was created by a program.

Answer(s): C,D

Explanation:

Two statements that describe a website categorized as a domain generated algorithm (DGA) are: The website is used to hide a command-and-control server and the domain was created by a program. A domain generated algorithm (DGA) is a technique used by cyber attackers to generate new domain names and IP addresses for malware's command and control servers. Executed in a manner that seems random, it makes it nearly impossible for threat hunters to detect and contain the attack. A command-and-control server is a server that communicates with malware installed on infected machines and sends commands or updates to them. A program is a piece of software that performs a specific task or function. A domain generated algorithm is implemented by a program that runs on the attacker's machine or the malware itself, and produces a large number of domain names based on some logic, such as date, time, seed, dictionary, etc.


Reference:

Domain generation algorithmAmong cyber-attack techniques, what is a DGA?



Which two functions are available for both inline and API protection? (Choose two.)

  1. multi-factor authentication
  2. threat protection
  3. DLP
  4. Cloud Security Posture Management (CSPM)

Answer(s): B,C

Explanation:

Netskope provides both inline and API protection for cloud applications and web traffic. Inline protection refers to the real-time inspection and enforcement of policies on the traffic between users and cloud applications, using Netskope's inline proxy mode. API protection refers to the retrospective inspection and enforcement of policies on the data that is already stored in cloud applications, using Netskope's API connectors. Two functions that are available for both inline and API protection are threat protection and DLP. Threat protection is the capability to detect and block malware, ransomware, phishing, and other cyber threats that may compromise cloud data or users. DLP is the capability to detect and protect sensitive data, such as personal information, intellectual property, or regulated data, that may be exposed or leaked through cloud applications.


Reference:

Netskope Inline Proxy ModeNetskope API ProtectionNetskope Threat ProtectionNetskope DLP Engine



Page 11 of 34



Post your Comments and Discuss Netskope NSK101 exam with other Community members:

Flash commented on August 25, 2024
Can we pass the exams by only using the free dumps my exam was scheduled on 28 of august
Anonymous
upvote