Q: 11
You use Netskope to provide a default Malware Scan profile for use with your malware policies. Also,
you want to create a custom malware detection profile.
In this scenario, what are two additional requirements to complete this task? (Choose two.)
Options
Discussion
D imo, but is the focus on 'default' or 'custom' profile requirements? That would totally change which two I pick.
Be respectful. No spam.
Q: 12
You are implementing tenant access security and governance controls for privileged users. You want
to start with controls that are natively available within the Netskope Cloud Security Platform and do
not require external or third-party integration.
Which three access controls would you use in this scenario? (Choose three.)
Options
Discussion
Option D (MFA) seems like a solid pick too, since it's recommended, but pretty sure Netskope requires external integration for MFA. Trap option there. ABC fits native controls best.
B or D? I think login attempt lockouts (B) is good but MFA (D) keeps showing up as recommended, even if it might not be native. E looks like a distractor though. Trap feels like D, but not 100% sure.
A is wrong, ABC makes sense here. IP allowlisting, failed login lockout, and RBAC are all available natively in the Netskope platform without bringing in external tools. D (MFA) usually needs third-party integration so it's out for this specific scenario. Saw similar logic covered in the official admin guide and practice Qs, so fairly confident. Disagree?
Probably A, B, and C. If "best" controls was the keyword instead of native, would D shift into the list?
Be respectful. No spam.
Q: 13
You are currently migrating users away from a legacy proxy to the Netskope client in the company’s
corporate offices. You have deployed the client to a pilot group; however, when the client attempts
to connect to Netskope, it fails to establish a tunnel.
In this scenario, what would cause this problem?
Options
Discussion
I don't see how B is right, isn't A (legacy proxy intercepting SSL/TLS) also a common issue that would stop the tunnel? Maybe there's a trap here with the proxy handling traffic before it even reaches Netskope.
Is it asking for the most likely cause during a *pilot* deployment or could this be about production setup? I’ve seen similar practice questions in official guides where the correct option depends on if fallback channels are allowed by policy.
Be respectful. No spam.
Q: 14
Your organization has three main locations with 30.000 hosts in each location. You are planning to
deploy Netskope using iPsec tunnels for security.
What are two considerations to make a successful connection in this scenario? (Choose two.)
Options
Discussion
Its C and D, OS is tempting but redundant POPs is needed for scale, browser is a distractor.
Maybe B and D. I feel like the OS can impact tunnel setup with compatibility or client config, and obviously you have to factor in the number of hosts for sizing. Not sold on C here, but open to being convinced.
C/D tbh. With 30k hosts per site, capacity and redundancy (POPs) are the big issues for iPsec tunnels. Don't think browser or OS really impacts tunnel stability at this scale, but open to other thoughts.
C and D, not A or B. Good question, really makes you think about scaling and redundancy in deployment.
Be respectful. No spam.
Q: 15
Your company asks you to use Netskope to integrate with Endpoint Detection and Response (EDR)
vendors such as Crowdstrike.
Which two requirements are needed for a successful integration and sharing of threat data? (Choose
two.)
Options
Discussion
A and C tbh. You need a remediation profile to define the actions, and API Client ID is standard for connecting to another platform like Crowdstrike. Device classification or custom log parser aren't required for this integration.
Its A and C for this one, right? I remember something about needing an API Client ID for the data-sharing connection, and remediation profiles sound familiar from a similar question. Not totally sure on the log parser or device classification parts. If anyone has actually set this up let me know if that matches your experience.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2