Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

You want to see the actual data that caused the policy violation within a DLP Incident view.

In this scenario, which profile must be set up?

A.

Quarantine Profile

B.

Forensics Profile

C.

Legal Hold Profile

D.

a GDPR DLP Profile

There is a DLP violation on a file in your sanctioned Google Drive instance. The file is in a deleted state. You need to locate information pertaining to this DLP violation using Netskope. In this scenario, which statement is correct?

A.

You can find DLP violations under Forensic profiles.

B.

DLP incidents for a file are not visible when the file is deleted.

C.

You can find DLP violations under the Incidents dashboard.

D.

You must create a forensic profile so that an incident is created.

Which Netskope component would an administrator use to see an overview of private application usage and performance?

A.

Digital Experience Management

B.

Publishers page

C.

Incident Management

D.

Cloud Exchange

You are required to present a view of all upload activities completed by users tunneled from the Los Angeles office to cloud storage applications.

Which two basic filters would you use on the SkopeIT Applications page to satisfy this requirement? (Choose two.)

A.

Activity

B.

Access Method

C.

Action

D.

CCL

You want to determine which NewEdge data planes that your remote users have been recently using.

Which area of the Netskope Tenant UI would provide this information?

A.

Client Steering under Digital Experience Management

B.

Network Steering under Digital Experience Management

C.

Users page under Settings

D.

Devices page under Settings

A customer is considering the cloud shared responsibility model.

In this scenario, which two criteria become the customer's responsibility? (Choose two.)

A.

controlling access

B.

third-party certification

C.

enforcing service level agreements

D.

preventing data leakage

What are two uses for deploying a Netskope Virtual Appliance? (Choose two.)

A.

to use as a log parser to discover in-use cloud applications

B.

to use as a local reverse proxy to secure a SaaS application

C.

to use as an endpoint for Netskope Private Access (NPA)

D.

to use as a secure way to generate Exact Data Match hashes

Which three components make up the Borderless SD-WAN solution? (Choose three)

A.

Endpoint SD-WAN Client

B.

SASE Orchestrator

C.

NPA Publisher

D.

SASE Gateway

E.

On-Premises Log Parser

All users are going through Netskope's Next Gen SWG. Your CISO requests a monthly report of all users who are accessing cloud applications with a "Low" or a "Poor" CCL, where the activity is either "Edit" or "Upload".

Using the Advanced Analytics interface, which two statements describe which actions must be performed in this scenario? (Choose two.)

A.

Create a report using the Data Collection "Page Events", filtering on the activities "Edit" and "Upload" for cloud apps with CCL values of "Low" or "Poor".

B.

Schedule a report with a monthly recurrence to be sent by e-mail with the attached PDF document at the end of each month.

C.

Create a report using the Data Collection "Application Events" filtering on the activities "Edit" and "Upload" for cloud apps with CCL values of "Low" or "Poor".

D.

Schedule a report with a monthly recurrence to be sent by SMS with the attached PDF document at the end of each month.

You just deployed the Netskope client in Web mode and several users mention that their messenger application is no longer working. Although you have a specific real-time policy that allows this application, upon further investigation you discover that it is using proprietary encryption. You need to permit access to all the users and maintain some visibility.

In this scenario, which configuration change would accomplish this task?

A.

Change the real-time policy to block the messenger application.

B.

Create a new custom cloud application using the custom connector that can be used in the real-time policy.

C.

Add a policy in the SSL decryption section to bypass the messenger domain(s).

D.

Edit the steering configuration and add a steering exception for the messenger application.