Free NSK200 Exam Braindumps (page: 5)

Page 4 of 16

You are troubleshooting an issue with Microsoft where some users complain about an issue accessing OneDrive and SharePoint Online. The configuration has the Netskope client deployed and active for most users, but some Linux machines are routed to Netskope using GRE tunnels. You need to disable inspection for all users to begin troubleshooting the issue.

In this scenario, how would you accomplish this task?

  1. Create a Real-time Protection policy to isolate Microsoft 365.
  2. Create a Do Not Decrypt SSL policy for the Microsoft 365 App Suite.
  3. Create a steering exception for the Microsoft 365 domains.
  4. Create a Do Not Decrypt SSL policy for OneDrive.

Answer(s): B

Explanation:

To disable inspection for all users accessing Microsoft 365, you need to create a Do Not Decrypt SSL policy for the Microsoft 365 App Suite. This policy will prevent Netskope from decrypting and analyzing the traffic for any Microsoft 365 app, regardless of the access method (Netskope client or GRE tunnel)3. This policy will also allow SNI-based policies to apply, but no deep analysis performed via Real-time Protection policies4. Therefore, option B is correct and the other options are incorrect.


Reference:

Add a Policy for SSL Decryption - Netskope Knowledge Portal, Default Microsoft appsuite SSL do not decrypt rule - Netskope Community



Your company has many users that are remote and travel often. You want to provide the greatest visibility into their activities, even while traveling. Using Netskope. which deployment method would be used in this scenario?

  1. Use proxy chaining.
  2. Use a Netskope client.
  3. Use an IPsec tunnel.
  4. Use a GRE tunnel.

Answer(s): B

Explanation:

The best deployment method for remote and traveling users is to use a Netskope client. The Netskope client is a lightweight software agent that runs on the user's device and steers web and cloud traffic to the Netskope cloud for real-time inspection and policy enforcement1. The Netskope client provides an always-on end user remote access experience and avoids backhauling (or hairpinning) remote users through the corporate network to access applications in public cloud environments2. The Netskope client also supports offline mode, which allows users to work offline and sync their policies when they reconnect to the internet



Your company has Microsoft Azure ADFS set up as the Identity Provider (idP). You need to deploy the Netskope client to all company users on Windows laptops without user intervention.

In this scenario, which two deployment options would you use? (Choose two.)

  1. Deploy the Netskope client with SCCM.
  2. Deploy the Netskope client with Microsoft GPO.
  3. Deploy the Netskope client using IdP.
  4. Deploy the Netskope client using an email Invitation.

Answer(s): A,B

Explanation:

To deploy the Netskope client to all company users on Windows laptops without user intervention, you can use either SCCM or GPO. These are two methods of packaging the application and pushing it silently to the user's device using Microsoft tools4. These methods do not require the user to have local admin privileges or to initiate the installation themselves. They also allow enforcing the use of the client through company policy. The Netskope client can authenticate the user using Azure ADFS as the identity provider, as long as the UPN of the logged in user matches the directory5



What is the purpose of the file hash list in Netskope?

  1. It configures blocklist and allowlist entries referenced in the custom Malware Detection profiles.
  2. It is used to allow and block URLs.
  3. It provides the file types that Netskope can inspect.
  4. It provides Client Threat Exploit Prevention (CTEP).

Answer(s): A

Explanation:

The purpose of the file hash list in Netskope is to configure blocklist and allowlist entries referenced in the custom Malware Detection profiles. A file hash list is a collection of MD5 or SHA-256 hashes that represent files that you want to allow or block in your organization. You can create a file hash list when adding a file profile and use it as an allowlist or blocklist for files in your organization1. You can then select the file hash list when creating a Malware Detection profile2.






Post your Comments and Discuss Netskope NSK200 exam with other Community members:

NSK200 Exam Discussions & Posts