New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You are assisting your network administrator to troubleshoot an issue with client-based NPA.

In the Netskope UI, what information do you need from the administrator to run the NPA troubleshooter for this user? (Choose two.)

A.

Publisher Name

B.

User & Device

C.

Private App ID

D.

Private App Name

Your company has a large number of medical forms that are allowed to exit the company when they are blank. If the forms contain sensitive data, the forms must not leave any company data centers, managed devices, or approved cloud environments. You want to create DLP rules for these forms.

Which first step should you take to protect these forms?

A.

Use Netskope Secure Forwarder to create EDM hashes of all forms.

B.

Use Netskope Secure Forwarder to create an MIP tag for all forms.

C.

Use Netskope Secure Forwarder to create fingerprints of all forms.

D.

Use Netskope Secure Forwarder to create an ML Model of all forms

Review the exhibit.

You installed Directory Importer and configured it to import specific groups ot users into your Netskope tenant as shown in the exhibit. One hour after a new user has been added to the domain, the user still has not been provisioned to Netskope.

What are three potential reasons for this failure? (Choose three.)

A.

Directory Importer does not support ongoing user syncs; you must manually provision the user.

B.

The server that the Directory Importer is installed on is unable to reach Netskope's add-on endpoint.

C.

The user is not a member of the group specified as a filter

D.

Active Directory integration is not enabled on your tenant.

E.

The default collection interval is 180 minutes, therefore a sync may not have run yet.

You are troubleshooting an issue with users who are unable to reach a financial SaaS application when their traffic passes through Netskope. You determine that this is because of IP restrictions in place with the SaaS vendor. You are unable to add Netskope's IP ranges at this time, but need to allow the traffic.

How would you allow this traffic?

A.

Use NPAto implement Source IP anchonng so the traffic will egress from the corporate data center.

B.

Use Explicit Proxy Over Tunnel (EPoT) so the traffic will egress from the corporate data center.

C.

Use Cloud Explicit Proxy so the traffic will egress from the corporate data center

D.

Use an IPsec tunnel to forward traffic so it will egress from the corporate data center

You created a Real-time Protection policy that blocks all activities to non-corporate S3 buckets, but determine that the policy is too restrictive. Specifically, users are complaining that normal websites have stopped rendering properly.

How would you solve this problem?

A.

Create a Real-time Protection policy to allow the Browse activity to the Amazon S3 application.

B.

Create a Real-time Protection policy to allow the Browse activity to the Cloud Storage category

C.

Create a Real-time Protection policy to allow the Download activity to the Cloud Storage category

D.

Create a Real-time Protection policy to allow the Download activity to the Amazon S3 application

You want to verify that Google Drive is being tunneled to Netskope by looking in the nsdebuglog file. You are using Chrome and the Netskope Client to steer traffic. In this scenario, what would you expect to see in the log file?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

You have enabled CASB traffic steering using the Netskope Client, but have not yet enabled a Real-time Protection policy. What is the default behavior of the traffic in this scenario?

A.

Traffic will be blocked and logged.

B.

Traffic will be allowed and logged.

C.

Traffic will be blocked, but not logged.

D.

Traffic will be allowed, but not logged.

You are the network architect for a company using Netskope Private Access. Multiple users are reporting that they are unable to access an application using Netskope Private Access that was working previously. You have verified that the Real-time Protection policy allows access to the application, private applications are steered for the users, and the application is reachable from internal machines. You must verify that the application is reachable through Netskope Publisher

In this scenario, which two tools in the Netskope Ul would you use to accomplish this task? (Choose two.)

A.

Reachability Via Publisher in the App Definitions page

B.

Troubleshooter tool in the App Definitions page

C.

Applications in Skope IT

D.

Clear Private App Auth under Users in Skope IT

You configured a pair of IPsec funnels from the enterprise edge firewall to a Netskope data plane. These tunnels have been implemented to steer traffic for a set of defined HTTPS SaaS applications accessed from end-user devices that do not support the Netskope Client installation. You discover that all applications steered through this tunnel are non-functional.

According to Netskope. how would you solve this problem?

A.

Restart the tunnel to stop the tunnel from flapping.

B.

Downgrade from IKE v2 to IKE v1.

C.

Install the Netskope root and intermediate certificates on the end-user devices.

D.

Disable Perfect Forward Secrecy on the tunnel configuration.

Review the exhibit.

You are the proxy administrator for a medical devices company. You recently changed a pilot group of users from cloud app steering to all Web traffic. Pilot group users have started to report that they receive the error shown in the exhibit when attempting to access the company intranet site that is publicly available. During troubleshooting, you realize that this site uses your company's internal certificate authority for SSL certificates.

Which three statements describe ways to solve this issue? (Choose three.)

A.

Import the root certificate for your internal certificate authority into Netskope.

B.

Bypass SSL inspection for the affected site(s).

C.

Create a Real-time Protection policy to allow access.

D.

Change the SSL Error Settings from Block to Bypass in the Netskope tenant.

E.

Instruct the user to proceed past the error message