Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

How does a cloud security solution achieve visibility into TLS/SSL-protected Web traffic?

A.

by altering the TLS handshake and forcing the website to use a weak encryption algorithm which can be brute-forced

B.

by altering the TLS handshake and forcing the website to use insecure (HTTP) access

C.

by performing the TLS handshake on behalf of the website and replacing the site's certificate with its own

D.

by using government-issued universal decryption keys for the ciphers

You want to prevent Man-in-the-Middle (MITM) attacks on an encrypted website or application. In this scenario, which method would you use?

A.

Use a stronger encryption algorithm.

B.

Use certificate pinning.

C.

Use a proxy for the connection.

D.

Use a weaker encryption algorithm.

Your company has implemented Netskope's Cloud Firewall and requires that all FTP connections are blocked regardless of the ports being used.

Which two statements correctly identify how to block FTP access? (Choose two.)

A.

Create a Real-time Protection policy with FTP as the destination application and Block as the action.

B.

Create a Real-time Protection policy with a custom Firewall App Definition for TCP port 21 as the destination application and Block as the action.

C.

Ensure there are no Real-time Protection polices that allow FTP and change the default non-Web action to Block.

D.

Create a custom Firewall App Definition for TCP port 21 and add it to the default tenant Steering Configuration as an exception.

What are two benefits of creating a policy group as a logical collection of Real-time Protection policies? (Choose two.)

A.

To split up policies by region or business unit.

B.

To enable Alert and Continue policies.

C.

To simplify workflow, allowing exact access to a specific set of policies.

D.

To provide additional actions based on policy match criteria.

Click the Exhibit button.

Referring to the exhibit, what are two recommended steps to be set on the perimeter device to monitor IPsec tunnels to a Netskope data plane? (Choose two.)

A.

Enable IKE Dead Peer Detection (DPD) for each tunnel.

B.

Send ICMP requests to the Netskope location's Probe IP

C.

Send HTTP requests to the Netskope location's Probe IP.

D.

Send ICMP requests to the Netskope location's proxy IPs.

What are two use cases for Netskope's DLP solution? (Choose two.)

A.

to stop unintentional data movement

B.

to detect malware in files before they are uploaded to a cloud application

C.

to detect sensitive data in password protected files

D.

to ensure regulatory compliance

You are asked to review files affected by malware in your organization. In this scenario, which two actions are possible and would be accessible from the Netskope UI -> Incidents --> Malware? (Choose two)

A.

Download the original malware file generating the alert to be analyzed by the SOC team

B.

Identify the exposure of the file identified as malware.

C.

Remediate the compromised devices.

D.

Determine the Detection Engine used to identify the malware.

Which three statements are correct about Netskope's NewEdge Security Cloud Network Infrastructure? (Choose three.)

A.

It takes advantage of the public cloud by deploying security services on Google Cloud Platform.

B.

It includes direct peering with Microsoft and Google in every data center.

C.

It is a private security cloud network that is massively over provisioned, highly elastic, and built for scale.

D.

It delivers a single, unified network with no surcharges or reliance on public cloud infrastructure or virtual PoPs.

E.

It simplifies the administrator's job by limiting access to pre-defined availability zones.

You have an issue with the Netskope client connecting to the tenant.

In this scenario, what are two ways to collect the logs from the client machine? (Choose two.)

A.

from the Netskope client Ul About page

B.

from the command line using the nsdiag command

C.

from the Netskope client system tray icon

D.

from the Netskope client Ul Configuration page

As an administrator, you are investigating an increase in the number of incidents related to compromised credentials. You are using the Netskope Compromised Credentials feature on your tenant to assess the situation. Which insights would you find when using this feature? (Choose two)

A.

Compromised usernames

B.

Breach information source

C.

Compromised passwords

D.

Affected managed applications