Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Exhibit

A user is connected to a cloud application through Netskope's proxy.

In this scenario, what information is available at Skope IT? (Choose three.)

A.

username. device location

B.

destination IP. OS patch version

C.

account instance, URL category

D.

user activity, cloud app risk rating

E.

file version, shared folder

When comparing data in motion with data at rest, which statement is correct?

A.

Data at rest cannot be scanned for malware until a user opens the file.

B.

Data in motion requires API integration.

C.

Data in motion requires the Netskope client.

D.

Data at rest requires API integration.

You want to enable Netskope to gain visibility into your users' cloud application activities in an inline mode.

In this scenario, which two deployment methods would match your inline use case? (Choose two.)

A.

Use a forward proxy.

B.

Use an API connector

C.

Use a log parser.

D.

Use a reverse proxy.

In the Skope IT interface, which two event tables would be used to label a cloud application instance? (Choose two.)

A.

Network Events

B.

Page Events

C.

Application Events

D.

Alerts

You need to provide a quick view under the Skope IT Applications page showing only risky shadow IT cloud applications being used.

In this scenario, which two filter combinations would you use to accomplish this task? (Choose two.)

A.

Sanctioned = No

B.

CCL = High. Under Research

C.

User Device Type = Windows Device

D.

CCL = Medium. Low, Poor

In the Tenant III, which two methods would an administrator use to update a File Profile with malicious file hashes? (Choose two)

A.

Upload a CSV file of malicious file hashes.

B.

Create a Threat Protection Profile to define a block list of malicious files.

C.

Input a list of malicious file hashes.

D.

Upload a JSON file of malicious file hashes.

What are two valid use cases for the Cloud Confidence Index (CCI)? (Choose two.)

A.

To recategorize cloud applications in the database

B.

To delete cloud applications from the database

C.

To identify the activities that Netskope supports for cloud applications

D.

To compare similar cloud applications

What are two characteristics of Netskope's Private Access Solution? (Choose two.)

A.

It provides protection for private applications.

B.

It provides access to private applications.

C.

It acts as a cloud-based firewall.

D.

It requires on-premises hardware.