Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

While most Web and SaaS traffic is decrypted for inspection, you are asked to prevent a certain host on the network from SSL decryption for privacy purposes.

A.

Create a steering exception for the host.

B.

Create a Real-time Protection policy, select the host, and choose to block SSL decryption.

C.

Create a Source Network Location for a Do Not Decrypt SSL policy.

D.

Add the host to the certificate-pinned application list.

Recently your company implemented Zoom for collaboration purposes and you are attempting to inspect the traffic with Netskope. Your initial attempt reveals that you are not seeing traffic from the Zoom client that is used by all users. You must ensure that this traffic is visible to Netskope.

In this scenario, which two steps must be completed to satisfy this requirement? (Choose two.)

A.

Create a steering exception for Zoom to ensure traffic is reaching Netskope.

B.

Create a Do Not Decrypt SSL policy for the Zoom application suite.

C.

Remove the Zoom certificate-pinned application from the default steering configuration.

D.

Remove the default steering exception for the Web Conferencing Category.

You are asked to grant access for a group of users to an application using NPA. So far, you have created and deployed the publisher and created a private application using the Netskope console.

Which two steps must also be completed to enable your users access to the application? (Choose two.)

A.

Create an inbound firewall rule to permit network traffic to reach the publisher

B.

Enable traffic steering for private applications.

C.

Create a Real-time Protection policy that allows your users to access the application.

D.

Define an application instance name in Skope IT.

Review the exhibit.

You are asked to restrict users from accessing YouTube content tagged as Sport. You created the required real-time policy; however, users can still access the content

Referring to the exhibit, what is the problem?

A.

The website is in a steering policy exception.

B.

The policy changes have not been applied.

C.

The YouTube content cannot be controlled.

D.

The traffic matched a Do Not Decrypt policy

You are using the Netskope DLP solution. You notice that valid credit card numbers in a file that you just uploaded to an unsanctioned cloud storage solution are not triggering a policy violation. You can see the Skope IT application events for this traffic but no DLP alerts.

Which statement is correct in this scenario?

A.

Netskope client is not enabled.

B.

You have set the severity threshold to a higher value.

C.

Netskope client is enabled, but API protection for the SaaS application is not configured.

D.

Credit card numbers are entered with a space or dash separator and not as a 16-digit consecutive number.

What is the purpose of the file hash list in Netskope?

A.

It configures blocklist and allowlist entries referenced in the custom Malware Detection profiles.

B.

It is used to allow and block URLs.

C.

It provides the file types that Netskope can inspect.

D.

It provides Client Threat Exploit Prevention (CTEP).

Review the exhibit.

You are asked to create a new role that allows analysts to view Events and Reports while providing user privacy. You need to avoid directly exposing identities and user location information.

Which three fields must you obfuscate in this scenario? (Choose three.)

A.

User IPs

B.

User names

C.

App names, URLs, and destination IPs

D.

File and object names

E.

Source location information

Which statement describes how Netskope's REST API, v1 and v2, handles authentication?

A.

Both REST API v1 and v2 require the use of tokens to make calls to the API

B.

Neither REST API v1 nor v2 require the use of tokens.

C.

REST API v2 requires the use of a token to make calls to the API. while API vl does not.

D.

REST API v1 requires the use of a token to make calls to the API. while API v2 does not.

With Netskope DLP, which feature would be used to detect keywords such as "Confidential" or "Access key"?

A.

Regular Expression

B.

Exact Match

C.

Fingerprint Classification

D.

Dictionary

Which statement describes a requirement for deploying a Netskope Private Application (NPA) Publisher?

A.

The publisher must be deployed in a public cloud environment, such as AWS.

B.

The publisher must be deployed in a private data center.

C.

The publisher must be deployed on the network where the private application will be accessed.

D.

The publisher's name must match the name of the application process that it will access.