Free NSK101 Exam Braindumps (page: 17)

Page 17 of 34

Which statement is correct about Netskope's Instance Awareness?

  1. It prevents users from browsing the Internet using outdated Microsoft Internet Explorer but allows them access if they use the latest version of Microsoft Edge.
  2. It identifies that a form hosted in Microsoft Forms belongs to the corporate Microsoft 365 tenant and not a tenant from a third party.
  3. It differentiates personal code from work-related code being uploaded to GitHub.
  4. It identifies if e-mails are being sent using Microsoft 365 through Outlook, Thunderbird, or the Web application in outlook.com.

Answer(s): B

Explanation:

Instance Awareness in Netskope provides visibility and control over instances of applications used by the organization. Specifically, it helps in differentiating between corporate and personal instances of the same application. This feature is particularly crucial in ensuring that corporate data is not uploaded to personal instances of applications and vice versa.

For example, it can identify that a form hosted in Microsoft Forms belongs to the corporate Microsoft 365 tenant, thereby preventing data from being mistakenly or maliciously sent to a third-party tenant. This ensures that only authorized instances of applications are used for corporate data, maintaining data security and compliance.


Reference:

Using the REST API v2 UCI Impact Endpoints - Netskope Knowledge Portal

REST API v2 Overview - Netskope Knowledge Portal

Using the REST API v2 dataexport Iterator Endpoints - Netskope Knowledge Portal



You added a new private app definition and created a Real-time Protection policy to allow access for all users. You have a user who reports that they are unable to access the application but all other applications work fine.

Which statement correctly describes how to troubleshoot this issue using the Netskope Web UI?

  1. You can verity the user's policy, steering configuration, client status and other relevant details using the Advanced Debugging tools in the Netskoge Client.
  2. You can verify the user's policy, steering configuration, client status and other relevant details using the Agg Discovery dashboard.
  3. You can verify the user's policy, steering configuration, client status and other relevant details using DEM.
  4. You can verify the user's policy, steering configuration, client status and other relevant details using the NPA Troubleshooter took

Answer(s): D

Explanation:

When a user is unable to access a newly added private application despite having the correct Real- time Protection policy in place, the NPA (Netskope Private Access) Troubleshooter tool can be used to diagnose and resolve the issue.

Accessing NPA Troubleshooter:

Navigate to the Netskope Web UI.

Go to the Troubleshooting section and select NPA Troubleshooter.

Verifying User Policy:

Check the specific policy applied to the user to ensure that it allows access to the application.

Ensure that there are no conflicting policies that might be blocking access.

Checking Steering Configuration:

Verify that the steering configuration is correctly set up to route the user's traffic to the Netskope platform.

Ensure that the correct gateways are being used and that the traffic is not being bypassed.

Client Status:

Confirm that the Netskope client is installed and running on the user's device.

Check the client logs for any errors or issues that might be preventing access.

Additional Details:

Review any other relevant details such as the user's network configuration, device status, and any recent changes that might have impacted connectivity.

By systematically using the NPA Troubleshooter tool to verify these aspects, you can identify and resolve the underlying issue preventing access to the private application.


Reference:

REST API v2 Overview - Netskope Knowledge Portal

Using the REST API v2 dataexport Iterator Endpoints - Netskope Knowledge Portal

Using the REST API v2 UCI Impact Endpoints - Netskope Knowledge Portal netskopesdk · PyPI

Netskope Rest APIv2(OAS 3.1) - Postman Collection



Click the Exhibit button.



Referring to the exhibit, what are two recommended steps to be set on the perimeter device to monitor IPsec tunnels to a Netskope data plane? (Choose two.)

  1. Enable IKE Dead Peer Detection (DPD) for each tunnel.
  2. Send ICMP requests to the Netskope location's Probe IP
  3. Send HTTP requests to the Netskope location's Probe IP.
  4. Send ICMP requests to the Netskope location's proxy IPs.

Answer(s): A,B

Explanation:

To monitor IPsec tunnels to a Netskope data plane, it is essential to ensure the stability and responsiveness of the tunnels. The recommended steps involve enabling monitoring mechanisms that detect and respond to tunnel failures. Here's a detailed explanation of the two recommended steps:

Enable IKE Dead Peer Detection (DPD) for each tunnel:

IKE Dead Peer Detection (DPD) is a method used to detect if the peer (remote endpoint of the tunnel) is no longer available or reachable. By enabling DPD, the device can automatically detect and tear down the IPsec tunnel if the peer does not respond, allowing for quick re- establishment of the tunnel if needed.

Implementation: Configure DPD in the IPsec settings of the perimeter device. This ensures that if the Netskope data plane is unreachable, the tunnel is automatically terminated and re-negotiated.

Send ICMP requests to the Netskope location's Probe IP:

Sending ICMP requests (ping) to the Netskope location's Probe IP helps in monitoring the availability and latency of the connection to the Netskope data plane. If the ICMP requests fail, it indicates a potential issue with the connectivity.

Implementation: Set up regular ICMP requests (ping) from the perimeter device to the Netskope Probe IPs. This allows for continuous monitoring of the tunnel's health and immediate detection of connectivity issues.


Reference:

REST API v2 Overview - Netskope Knowledge Portal

Using the REST API v2 dataexport Iterator Endpoints - Netskope Knowledge Portal

Using the REST API v2 UCI Impact Endpoints - Netskope Knowledge Portal



Click the Exhibit button.



What are two use cases where the parameter shown in the exhibit is required? (Choose two.)

  1. When you create a policy to prevent file transfer between a sanctioned Google Drive and personal Google Drive.
  2. When you share the JoC between a third-party security solution and the Threat Protection Profile.
  3. When you create a policy to prevent binary files larger than 5 MB that are shared publicly on a sanctioned OneDrive.
  4. When you share Incident details about files detected in a DLP incident.

Answer(s): A,C

Explanation:

The parameter shown in the exhibit (File Profile) is crucial in policies where file type, size, and other attributes need to be specified. Here are two use cases where this parameter is required:

When you create a policy to prevent file transfer between a sanctioned Google Drive and personal Google Drive:
In this use case, the File Profile is used to define the types of files that are not allowed to be transferred between different Google Drive instances. By specifying the file types in the policy, administrators can ensure that sensitive corporate data is not transferred to personal accounts.

Implementation: Create a new File Profile with the desired file types and apply this profile in the policy that governs the data transfer rules between sanctioned and personal Google Drive instances.

When you create a policy to prevent binary files larger than 5 MB that are shared publicly on a sanctioned OneDrive:

This use case involves creating a policy that restricts the sharing of large binary files (e.g., executable files) on publicly accessible folders in OneDrive. The File Profile parameter allows defining the file size and type criteria.

Implementation: Define a File Profile that specifies binary files and sets a size limit (e.g., 5 MB). Apply this profile in the policy to prevent such files from being shared publicly.


Reference:

REST API v2 Overview - Netskope Knowledge Portal

Using the REST API v2 dataexport Iterator Endpoints - Netskope Knowledge Portal

Using the REST API v2 UCI Impact Endpoints - Netskope Knowledge Portal netskopesdk · PyPI

Netskope Rest APIv2(OAS 3.1) - Postman Collection



Page 17 of 34



Post your Comments and Discuss Netskope NSK101 exam with other Community members:

Flash commented on August 25, 2024
Can we pass the exams by only using the free dumps my exam was scheduled on 28 of august
Anonymous
upvote