10/235 questions · Unlock full access
Q1

A financial services firm is migrating its internal CRM system, hosted on-premises, to a private application accessible via Netskope Private Access (NPA). During the pilot phase, remote users report intermittent connectivity and slow performance. The security architect observes that the NPA Publisher is deployed as a single virtual machine in their vSphere environment. To improve resilience and performance, the decision is made to deploy a high-availability (HA) pair of Publishers. Which of the following is a critical prerequisite for establishing a functional NPA Publisher HA pair?

Q2

A global manufacturing company uses Netskope for SaaS API Data Protection to scan its corporate Box instance for sensitive intellectual property. The security team has created a DLP policy to detect files with 'Project Chimera' keywords and apply a quarantine action. After running a scan, the policy violation log shows that several files were correctly identified, but the quarantine action failed for all of them. What is the most likely reason for this failure?

Q3Multiple answers

During a security audit, it was discovered that developers are frequently using personal GitHub accounts to access both corporate and personal repositories. Your organization wants to implement a policy to allow read/write access to the corporate GitHub organization ('acme-corp') but restrict all other GitHub organizations to read-only access. Which TWO of the following components are essential to create and enforce this policy in Netskope? (Select TWO)

Q4

**Case Study:** Global Innovations Inc., a technology research firm, has adopted a cloud-first strategy, heavily utilizing AWS for its development and production workloads. The firm's security posture is managed by a central IT security team, which has deployed Netskope for Cloud Security Posture Management (CSPM) to monitor their AWS environment for misconfigurations against the CIS AWS Foundations Benchmark. During a recent review, the CSPM dashboard reported a critical alert: 'IAM policies should not allow full "*:*" administrative privileges.' The alert identified an IAM role named 'EC2-Admin-Access' which contained a statement with `"Effect": "Allow", "Action": "*", "Resource": "*"`. This role is attached to several EC2 instances in a production VPC that host a legacy monolithic application. The application development team claims this level of access is necessary for the application's automated self-healing and deployment scripts to function. The CISO has mandated that this critical finding must be remediated without impacting the application's functionality. The security team is tasked with finding a solution that adheres to the principle of least privilege while ensuring the application continues to operate. The team has limited visibility into the specific API calls the application makes. Which approach should the security architect recommend to resolve the CSPM violation while minimizing operational risk?

Q5

True or False: When using Netskope's API Data Protection for a SaaS application like Microsoft 365, the initial and subsequent scans can only be triggered manually by an administrator from the Netskope UI.

Q6

A security analyst is reviewing alerts from the Netskope UEBA engine and notices a high-severity anomaly for a user in the finance department. The anomaly is 'Unusual Data Exfiltration to a Personal Cloud Storage App.' The CISO wants to understand the data flow and decision process that led to this alert. Which of the following diagrams best represents the process? ```mermaid graph TD A[User Uploads File to Personal Dropbox] --> B{Netskope Inline Inspection}; B --> C{Is App Category Cloud Storage?}; C -->|Yes| D{Is App Instance Corporate?}; D -->|No| E[Log Activity Metadata]; E --> F[Send Metadata to UEBA Engine]; F --> G{Compare with User's Baseline Behavior}; G --> H{Is Download Volume/Frequency Anomalous?}; H -->|Yes| I([Generate High-Severity Alert]); C -->|No| J[Allow/Block per Policy]; D -->|Yes| K[Apply Corporate Policy]; H -->|No| L[Continue Monitoring]; ```

Q7

A hospital is implementing Netskope to prevent the exfiltration of Protected Health Information (PHI). They have a DLP policy that blocks uploads containing PHI to any cloud service. However, they need to create an exception for a specific, sanctioned file-sharing portal used with a partner clinic. The portal is hosted at 'sharing.partnerclinic.com'. The security team wants to ensure that the exception is as specific as possible to avoid accidental data leakage. Which configuration represents the most secure and precise way to create this exception?

Q8

A large enterprise has deployed the Netskope Client to all managed endpoints. The network team is concerned about the potential performance impact of SSL decryption on client devices. The security architect has been asked to design a steering configuration that balances security with performance. The company's policy is to decrypt all 'High-Risk' categories, but bypass decryption for trusted, low-risk categories like 'Finance' and 'Health'. Which component of the steering configuration is used to define these decryption rules?

Q9

What is the primary function of the Netskope Cloud Exchange (CE) platform in a security architecture?

Q10

An organization is using Netskope RBI (Remote Browser Isolation) to protect users browsing websites in the 'Newly Registered Domains' category. A user attempts to visit `www.newbrandsite.com`, which was registered yesterday. The user reports they can view the website, but they are unable to fill out a 'Contact Us' form on the page. What is the most likely cause of this issue?