Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

You consume application infrastructure (middleware) capabilities by a third-party provider. What is the cloud service model that you are using in this scenario?

A.

PaaS

B.

MaaS

C.

DaaS

D.

SaaS

Which networking function does a SASE solution provide above and beyond an SSE solution?

A.

Secure Web Gateway

B.

Cloud Access Security Broker

C.

Data Loss Prevention

D.

Software Defined Wide Area Network

Which two traffic steering configurations are supported by Netskope? (Choose two.)

A.

browser isolation traffic only

B.

cloud applications only

C.

all Web traffic including cloud applications

D.

Web traffic only

You are creating a real-time policy for cloud applications.

In addition to users, groups, and organizational units, which two source criteria would support this scenario? (Choose two.)

A.

protocol version

B.

access method

C.

browser version

D.

device classification

Click the Exhibit button.

You configured a set of Cloud Firewall policies as shown in the exhibit and changed your Steering Configuration to All Traffic for Group A and Group B. Users in Group A report that they are unable to access a third-party server using TCP port 3389. Referring to the exhibit, which action correctly describes how you would allow these connections without allowing unnecessary access?

A.

Add Group A to the Group B Allow policy.

B.

Create an Allow policy using a custom application including the destination IP and TCP port 3389.

C.

Move the Group B Allow policy above the Group A Allow policy.

D.

Change the default action to Allow.

You want to take into account some recent adjustments to CCI scoring that were made in your Netskope tenant.

In this scenario, which two CCI aspects in the Ul would be used in a real-time protection policy? (Choose two.)

A.

App Tag

B.

CCL

C.

App Score

D.

GDPR Readiness

Your organization has implemented Netskope Private Access (NPA) for all users. Users from the European region are reporting that they are unable to access many of their applications. You suspect that the publishers for the European data center may be disconnected and you want to verify the Publishers' status.

Which two methods describe how you would accomplish this task? (Choose two.)

A.

Use the Status field on the Publishers page.

B.

Use the Network Events page in

C.

Use the Netskope Private Access Troubleshooter.

D.

Use the Private Apps page in

You want to deploy Netskope's zero trust network access (ZTNA) solution, NPA. In this scenario, which action would you perform to accomplish this task?

A.

Create an OAuth identity access control between your users and your applications.

B.

Set up a reverse proxy using SAML and an identity provider.

C.

Enable Steer all Private Apps in your existing steering configuration(s) from the admin console.

D.

Configure SCIM to exchange identity information and attributes with your applications.

A company is attempting to steer traffic to Netskope using GRE tunnels. They notice that after the initial configuration, users cannot access external websites from their browsers.

What are three probable causes for this issue? (Choose three.)

A.

The pre-shared key for the GRE tunnel is incorrect.

B.

The configured GRE peer in the Netskope platform is incorrect.

C.

The corporate firewall might be blocking GRE traffic.

D.

The route map was applied to the wrong router interface.

E.

Netskope does not support GRE tunnels.

You are required to restrict cloud users from uploading data to any risky cloud storage service as defined by the Cloud Confidence Index. In the Netskope platform, which two policy elements would enable you to implement this control? (Choose two)

A.

Device Classification

B.

Category

C.

Cloud App

D.

Cloud Confidence Level