You are asked to create a new Real-time Protection policy to scan SMTP emails using data loss
prevention (DLP) for personal health information (PHI). The scope is limited to only emails being sent
from Microsoft Exchange Online to outside recipients.Q: 1
Review the exhibit.
You are asked to create a new Real-time Protection policy to scan SMTP emails using data loss
prevention (DLP) for personal health information (PHI). The scope is limited to only emails being sent
from Microsoft Exchange Online to outside recipients.
You are asked to create a new Real-time Protection policy to scan SMTP emails using data loss
prevention (DLP) for personal health information (PHI). The scope is limited to only emails being sent
from Microsoft Exchange Online to outside recipients.Options
Discussion
Maybe D? I thought DLP policy would cover scanning for PHI in emails. Not 100% sure if it's different from the Email Outbound policy. Anyone else think it could be D?
Be respectful. No spam.
Q: 2
You are using Skope IT to analyze and correlate a security incident. You are seeing too many events
generated by API policies. You want to filter for logs generated by the Netskope client only.
Options
Discussion
Option D, Using
access_method neq Client in query mode seems logical since it filters out non-client events, but I think the official guide emphasizes dropdown selection. I saw a similar scenario in practice questions, so maybe double-check with labs.C or A, depends if the question means "generated by the Client" specifically or if tunnel connections via the client count too. If it said "most secure method" instead, maybe D would make sense?
Be respectful. No spam.
Q: 3
You are testing policies using the DLP predefined identifier "Card Numbers (Major Networks; all)." No
DLP policy hits are observed.
Options
Discussion
Why not C? Wouldn't normalizing to 16-digit numbers catch more patterns, or does the DLP still require valid card checks?
B but kinda confused. So the test data has to be actual valid card numbers? Can anyone confirm?
Be respectful. No spam.
Q: 4
Review the exhibit.
You are asked to create a new role that allows analysts to view Events and Reports while providing
user privacy. You need to avoid directly exposing identities and user location information.
Which three fields must you obfuscate in this scenario? (Choose three.)
You are asked to create a new role that allows analysts to view Events and Reports while providing
user privacy. You need to avoid directly exposing identities and user location information.
Which three fields must you obfuscate in this scenario? (Choose three.)Options
Discussion
Makes sense to me: A, B, E.
A, B. E. Official guide and exam labs make questions like this clearer.
Be respectful. No spam.
Q: 5
Your team is asked to investigate ten Netskope DLP incidents. You want to assign these incidents
among different team members.
Options
Discussion
Probably C here since only the DLP Incident workflow lets you assign specific DLP incidents to team members right inside Netskope. The ticketing tool could work, but it isn't integrated with DLP specifics. Pretty sure about this from similar exam questions. Someone correct me if there's a new feature I missed.
I see why people might consider A with a ticketing tool, especially if you have external workflows, but unless the question says you're working outside Netskope, C is the only one that directly supports assigning owners for DLP incidents in the native UI. Only the DLP Incident workflow (C) is purpose-built for this inside Netskope. If your org had a strong integration with a ticketing platform, maybe that changes things-but I think C is what they want here. Anyone else thinking of a corner case?
Be respectful. No spam.
Q: 6
You want to allow both the user identities and groups to be imported in the Netskope platform.
Which two methods would satisfy this requirement? (Choose two.)
Options
Discussion
I think this is same as a common exam questions. during practice, and it's definitely A and C-they both support importing users and groups into Netskope. Importer is used for AD/LDAP, SCIM is pretty standard with IdPs. If anyone's seen something different in exam reports, let me know.
Be respectful. No spam.
Q: 7
You are deploying a Netskope client in your corporate office network. You are aware of firewall or
proxy rules that need to be modified to allow traffic.
Which two statements are true in this scenario? (Choose two.)
Options
Discussion
Definitely C and D. The Netskope client always relies on TCP 443 for the tunnel to the cloud, and UDP 443 (DTLS) is just highly recommended for performance but not absolutely required. Never needed to set up SSL decryption (B) unless you have a specific inspection policy in place. Let me know if I missed something here.
Nah, it's not B. C and D are right here. UDP 443 lets DTLS work for better performance and TCP 443 is required for the client tunnel. B is a common trap since SSL decryption isn't usually needed for the tunnel itself. Seen this in similar practice sets.
Its C and D. Netskope client always needs TCP 443 open for the main tunnel, and DTLS (UDP 443) is recommended for performance. That's straight from the official Netskope deployment guides. Pretty sure SSL decryption isn't required in this scenario, but open to correction.
Probably B and D. If SSL decryption isn't enabled on the proxy, I don't think the traffic can be properly inspected, which could break visibility, especially with tunneling. UDP port 443 isn't always required unless you're specifically using DTLS features. Am I missing a corner case here?
Be respectful. No spam.
Q: 8
You created the Netskope application in your IdP for user provisioning and validated that the API
Integration settings are correct and functional. However, you are not able to push the user groups
from the IdP into your Netskope tenant.
Options
Discussion
D imo. A is tempting but it's really a SCIM order thing, users need to be present first or group sync fails.
Hate how they always trip you up with SCIM order stuff. It's D, since you need to push the users before trying to sync groups or the group sync just fails.
I figured B might be the issue here because lacking Create User permissions sounds like it would block provisioning, but looking at it closer, that's more about initial user creation than group sync. I think I'm missing the SCIM dependency between users and groups. Does anyone else agree that B could still cause similar problems?
Be respectful. No spam.
Q: 9
You discover the ongoing use of the native Dropbox client in your organization. Although Dropbox is
not a corporate-approved application, you do not want to prevent the use of Dropbox. You do,
however, want to ensure visibility into its usage.
Options
Discussion
Option D fits here. With Destination Locations steering exceptions, you can direct Dropbox app traffic to Netskope for inspection, so you get visibility but don't block access. I think A and B would restrict usage, which isn't what they want. Pretty sure D, unless the organization has some unusual routing setup.
Be respectful. No spam.
Q: 10
Review the exhibit.
A security analyst needs to create a report to view the top five categories of unsanctioned
applications accessed in the last 90 days. Referring to the exhibit, what are two data collections in
Advanced Analytics that would be used to create this report? (Choose two.)
A security analyst needs to create a report to view the top five categories of unsanctioned
applications accessed in the last 90 days. Referring to the exhibit, what are two data collections in
Advanced Analytics that would be used to create this report? (Choose two.)Options
Discussion
B/C here. Both datasets capture activity relevant to unsanctioned app access, not just alerts or network events. Pretty sure that's what's needed for this top five report.
Option B and C. These both track app usage events, which is what the question wants.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2