10/238 questions · Unlock full access
Q1

A financial services company is implementing Netskope Private Access (NPA) to provide Zero Trust access to internal applications. The security architect wants to ensure that access to the internal financial modeling application, hosted at 10.10.50.100, is only granted to users in the 'Finance-Quant' Active Directory group who are connecting from corporate-managed devices. Which combination of configurations is required to enforce this specific access policy?

Q2Multiple answers

A healthcare organization uses Netskope for SaaS Security Posture Management (SSPM) to monitor its Microsoft 365 environment. A security analyst needs to create a policy that continuously checks for publicly shared SharePoint sites containing files classified with the 'PHI' (Protected Health Information) tag. Which TWO components are essential to build this SSPM policy? (Select TWO)

Q3

A consultant is configuring Netskope's Cloud Threat Exchange (CTE) to share Indicators of Compromise (IOCs) with a third-party EDR solution. The goal is to automate the process of blocking malicious file hashes detected by Netskope across all endpoints. After configuring the CTE plugin for the EDR, the consultant observes that new malicious hashes identified by Netskope are not being shared. What is the most likely misconfiguration?

Q4

True or False: When using Netskope's document fingerprinting for a DLP profile, the system creates and stores a hash of the entire document, which is then used for matching.

Q5

**Company Background:** Global Finance Inc. is a multinational investment firm that has recently adopted a cloud-first strategy, migrating most of its collaboration tools to Microsoft 365 and using Salesforce as its primary CRM. The company has a strict regulatory requirement to prevent the exfiltration of sensitive client financial data and personally identifiable information (PII). **Current Situation:** The firm has deployed the Netskope client to all corporate laptops for inline inspection of cloud traffic. They have also configured an API connection to their Microsoft 365 tenant for out-of-band scanning. A recent audit revealed that employees are using personal, unsanctioned cloud storage services (like Dropbox and Mega) to exfiltrate sensitive financial spreadsheets. Furthermore, there is a concern that users are sharing sensitive data from the corporate Salesforce instance with personal email addresses via 'Share' activities. **Requirements:** 1. Block all uploads to any cloud storage application category except for the sanctioned corporate OneDrive for Business instance. 2. Prevent users from sharing any Salesforce record that contains more than 10 unique customer PII patterns (e.g., SSNs, credit card numbers) with any external email domain. 3. All policy violations must generate a high-severity alert and be logged to the corporate SIEM. 4. The solution must be implemented with minimal disruption to legitimate business activities. Which solution design BEST meets all stated requirements?

Q6

A system administrator is reviewing the Netskope steering configuration for a new deployment. The goal is to ensure all web traffic from managed endpoints is inspected, regardless of whether the user is in the office or remote. The office network is 192.168.1.0/24. Which configuration mode for the Netskope client would be most appropriate?

Q7

During a security audit, an analyst discovers that several users have been granted excessive permissions within the company's AWS environment, violating the principle of least privilege. The company wants to use Netskope to continuously monitor for and alert on IAM users who have administrative-level permissions. Which Netskope feature should be used to accomplish this?

Q8

A security team is investigating an alert from Netskope Advanced Analytics indicating an unusually high volume of data has been downloaded from a sanctioned cloud application by a user. This activity is anomalous compared to the user's established baseline. What is the name of the feature within Netskope that provides this type of behavior-based threat detection?

Q9

An administrator needs to create a DLP policy to prevent the upload of source code files to any cloud application. The policy should identify files with extensions like .py, .java, and .cpp. What is the most direct way to define the data to be protected in the DLP profile?

Q10

A company is using Netskope Remote Browser Isolation (RBI) to protect users browsing high-risk websites. A user reports that they are unable to copy and paste text from an isolated website into a local application. What RBI policy setting most likely needs to be adjusted to allow this functionality?