Weekend Sale Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Download Full Version NSK101 Netskope Exam

Page: 3 / 5
Total 60 questions

Netskope Certified Cloud Security Administrator (NCCSA) Questions and Answers

Question 9

Which two use cases would be considered examples of Shadow IT within an organization? (Choose two.)

Options:

A.

a sanctioned Salesforce account used by a contractor to upload non-sensitive data

B.

a sanctioned Wetransfer being used by a corporate user to share sensitive data

C.

an unsanctioned Microsoft 365 OneDrive account being used by a corporate user to upload sensitive data

D.

an unsanctioned Google Drive account used by a corporate user to upload non-sensitive data

Question 10

You want to block access to sites that use self-signed certificates. Which statement is true in this scenario?

Options:

A.

Certificate-related settings apply globally to the entire customer tenant.

B.

Certificate-related settings apply to each individual steering configuration level.

C.

Certificate-related settings apply to each individual client configuration level.

D.

Self-signed certificates must be changed to a publicly trusted CA signed certificate.

Question 11

You investigate a suspected malware incident and confirm that it was a false alarm.

Options:

A.

In this scenario, how would you prevent the same file from triggering another incident?

B.

Quarantine the file. Look up the hash at the VirusTotal website.

C.

Export the packet capture to a pcap file.

D.

Add the hash to the file filter.

Question 12

There is a DLP violation on a file in your sanctioned Google Drive instance. The file is in a deleted state. You need to locate information pertaining to this DLP violation using Netskope. In this scenario, which statement is correct?

Options:

A.

You can find DLP violations under Forensic profiles.

B.

DLP incidents for a file are not visible when the file is deleted.

C.

You can find DLP violations under the Incidents dashboard.

D.

You must create a forensic profile so that an incident is created.

Page: 3 / 5
Total 60 questions