Practice Free NSK101 Exam Online Questions
You are working with traffic from applications with pinned certificates.
In this scenario, which statement is correct?
- A . An exception should be added to the steering configuration.
- B . The domains used by certificate-pinned applications should be added to the authentication bypass list.
- C . Traffic with pinned certificates should be blocked.
- D . The domains used by applications with pinned certificates should be allowed in an inline policy.
A
Explanation:
When working with traffic from applications with pinned certificates, you should add an exception to the steering configuration to bypass them. Pinned certificates are a security technique that prevents man-in-the-middle attacks by validating the server certificates against a hardcoded list of certificates in the application. If you try to intercept or inspect the traffic from such applications, they will reject the connection or display an error message. Therefore, you should add the domains used by certificate-pinned applications as exceptions in your steering configuration, so that they are not steered to Netskope for analysis and enforcement.
Reference: Certificate Pinned ApplicationsCreating a Steering Configuration
Your organization has implemented Netskope Private Access (NPA) for all users. Users from the European region are reporting that they are unable to access many of their applications. You suspect that the publishers for the European data center may be disconnected and you want to verify the Publishers’ status.
Which two methods describe how you would accomplish this task? (Choose two.)
- A . Use the Status field on the Publishers page.
- B . Use the Network Events page in
- C . Use the Netskope Private Access Troubleshooter.
- D . Use the Private Apps page in
A, C
Explanation:
To verify the status of the Publishers in the European data center, the following methods can be used:
Use the Status field on the Publishers page:
Navigate to the Publishers page in the Netskope UI.
Check the Status field to see if any Publishers are disconnected or experiencing issues.
Use the Netskope Private Access Troubleshooter:
Access the Netskope Private Access Troubleshooter tool.
This tool provides detailed diagnostic information and helps identify connectivity issues with Publishers.
These methods provide direct insights into the health and connectivity status of the Publishers, helping to quickly identify and resolve any issues affecting user access.
Reference: Netskope Knowledge Portal: Private Access
Netskope Private Access Troubleshooter
When comparing data in motion with data at rest, which statement is correct?
- A . Data at rest requires API integration.
- B . Data in motion requires API integration.
- C . Data at rest cannot be scanned for malware until a user opens the file.
- D . Data in motion requires the Netskope client.
D
Explanation:
When comparing data in motion with data at rest, it is important to understand how each type of data is handled in terms of security and monitoring:
Data in motion refers to data actively moving from one location to another, such as through email, instant messaging, or any other form of communication over the internet. To secure and monitor data in motion, Netskope typically requires the deployment of the Netskope client on user devices. The client helps enforce security policies, monitor data transfers, and protect against data loss and other threats during the data’s transit.
Reference: Netskope Knowledge Portal: Data Protection
Netskope Client Overview
There is a DLP violation on a file in your sanctioned Google Drive instance. The file is in a deleted state. You need to locate information pertaining to this DLP violation using Netskope.
In this scenario, which statement is correct?
- A . You can find DLP violations under Forensic profiles.
- B . DLP incidents for a file are not visible when the file is deleted.
- C . You can find DLP violations under the Incidents dashboard.
- D . You must create a forensic profile so that an incident is created.
C
Explanation:
To locate information pertaining to a DLP violation on a file in your sanctioned Google Drive instance, you can use the Incidents dashboard in Netskope. The Incidents dashboard provides a comprehensive view of all the incidents that have occurred in your cloud environment, such as DLP violations, malware infections, anomalous activities, etc. You can filter the incidents by various criteria, such as app name, incident type, severity, user name, etc. You can also drill down into each incident to see more details, such as file name, file path, file owner, file size, file type, etc. The Incidents dashboard can show DLP violations for files that are in a deleted state, as long as they are still recoverable from the trash bin of the app. If the file is permanently deleted from the app, then the incident will not be visible in the dashboard.
Reference: Netskope Incidents Dashboard
You need to locate events for specific activities such as "edit" or "login successful" in a cloud application.
In which SkopeIT Events & Alerts page would this information be found?
- A . Endpoint Events
- B . Page Events
- C . Application Events
- D . Websites
C
Explanation:
The Application Events page in the SkopeIT Events & Alerts section is where you can find logs and events related to specific activities within cloud applications, such as "edit" or "login successful". This section provides a detailed audit trail of user activities and application usage, which is essential for monitoring, security, and compliance purposes.
This answer is validated by the event categorization provided in the Netskope documentation, where application-specific events are logged under the Application Events section for easier tracking and analysis.
Reference: REST API v2 Overview – Netskope Knowledge Portal
Using the REST API v2 UCI Impact Endpoints – Netskope Knowledge Portal
Postman Collection for Netskope API
You need to create a service request ticket for a client-related issue using the Netskope client Ul. In this scenario, you generate the client logs by right-clicking on the system tray icon and choosing
- A . Save logs
- B . Configuration
- C . Troubleshoot
- D . Help
C
Explanation:
To create a service request ticket for a client-related issue using the Netskope client UI, you need to generate the client logs by right-clicking on the system tray icon and choosing Troubleshoot. This will open a window where you can select the option to Save Logs, which will create a zip file containing the client logs. You can then attach this file to your service request ticket and provide any relevant details about the issue. Choosing Save logs, Configuration, or Help will not generate the client logs, as they perform different functions, such as saving the current configuration, opening the settings menu, or opening the help page.
Reference: [Netskope Client Troubleshooting].
Which compliance standard should a company consider if both controllers and processors have legal entities in the EU?
- A . PCI-DSS
- B . GDPR
- C . Safe Harbor
- D . LGPD
B
Explanation:
The General Data Protection Regulation (GDPR) is the compliance standard a company should consider if both controllers and processors have legal entities in the EU. The GDPR applies to any organization that processes personal data of individuals within the EU, regardless of where the organization itself is based. This regulation imposes strict rules on data handling and provides robust protection for personal data.
Reference: GDPR is designed to protect data privacy for all individuals within the European Union (EU) and the European Economic Area (EEA). It also addresses the export of personal data outside the EU and EEA
areas.
What are two CASB inline interception use cases? (Choose two.)
- A . blocking file uploads to a personal Box account
- B . running a retroactive scan for data at rest in Google Drive
- C . using the Netskope steering client to provide user alerts when sensitive information is posted in Slack
- D . scanning Dropbox for credit card information
A, C
Explanation:
CASB inline interception use cases are scenarios where you need to apply real-time policies and actions on the traffic between users and cloud applications. For example, you may want to block file uploads to a personal Box account to prevent data leakage or exfiltration. You can use Netskope’s inline proxy mode to intercept and inspect the traffic between users and Box, and apply granular policies based on user identity, device type, app instance, file metadata, etc. You can also use Netskope’s inline proxy mode to provide user alerts when sensitive information is posted in Slack. For example, you may want to warn users when they share credit card numbers or social security numbers in Slack channels or messages. You can use Netskope’s steering client to redirect the traffic between users and Slack to Netskope’s inline proxy for inspection and enforcement. You can also use Netskope’s DLP engine to detect sensitive data patterns and apply actions such as alerting or blocking.
Reference: Netskope Inline Proxy ModeNetskope Steering Client [Netskope DLP Engine]
A customer wants to detect misconfigurations in their AWS cloud instances.
In this scenario, which Netskope feature would you recommend to the customer?
- A . Netskope Secure Web Gateway (SWG)
- B . Netskope Cloud Security Posture Management (CSPM)
- C . Netskope Advanced DLP and Threat Protection
- D . Netskope SaaS Security Posture Management (SSPM)
B
Explanation:
If a customer wants to detect misconfigurations in their AWS cloud instances, the Netskope feature that I would recommend to them is Netskope Cloud Security Posture Management (CSPM). Netskope CSPM is a service that provides continuous assessment and remediation of public cloud deployments for risks, threats, and compliance issues. Netskope CSPM leverages the APIs available from AWS and other cloud service providers to scan the cloud infrastructure for misconfigurations, such as insecure permissions, open ports, unencrypted data, etc. Netskope CSPM also provides security posture policies, profiles, and rules that can be customized to match the customer’s security standards and best practices. Netskope CSPM can also alert, report, or remediate the misconfigurations automatically or manually.
Reference: Netskope CSPMCloud Security Posture Management
In which two scenarios would you use SD-WAN technology? (Choose two.)
- A . to differentiate between corporate and personal SaaS applications
- B . to optimize utilization and performance across multiple Internet connections
- C . to ensure a user’s corporate laptop has all of the required security compliance software in place
- D . to replace dedicated MPLS connections with multiple broadband WAN and mobile options
B, D
Explanation:
SD-WAN technology is used in the following scenarios:
To optimize utilization and performance across multiple Internet connections:
SD-WAN allows organizations to aggregate multiple Internet connections and optimize traffic flow based on application requirements and network conditions. This improves overall network performance and ensures efficient use of available bandwidth.
To replace dedicated MPLS connections with multiple broadband WAN and mobile options:
SD-WAN provides the flexibility to use a mix of broadband, LTE, and other connectivity options to replace traditional MPLS circuits. This can significantly reduce costs and improve agility in network deployment and management.
Reference: Netskope Knowledge Portal: SD-WAN Integration
Netskope Knowledge Portal: Benefits of SD-WAN
