Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Netskope NSK200 Practice Exam with Questions & Answers | Set: 2

Questions 11

You are using the Netskope DLP solution. You notice that valid credit card numbers in a file that you just uploaded to an unsanctioned cloud storage solution are not triggering a policy violation. You can see the Skope IT application events for this traffic but no DLP alerts.

Which statement is correct in this scenario?

Options:
A.

Netskope client is not enabled.

B.

You have set the severity threshold to a higher value.

C.

Netskope client is enabled, but API protection for the SaaS application is not configured.

D.

Credit card numbers are entered with a space or dash separator and not as a 16-digit consecutive number.

Netskope NSK200 Premium Access
Questions 12

To which three event types does Netskope's REST API v2 provide access? (Choose three.)

Options:
A.

application

B.

alert

C.

client

D.

infrastructure

E.

user

Questions 13

Review the exhibit.

NSK200 Question 13

What is the purpose of the configuration page shown Ii the exhibit?

Options:
A.

to provision a Netskope client using SCCM

B.

to allow users to authenticate against the proxy

C.

to onboard Active Directory users to a Netskope tenant

D.

to enforce administrative role-based access

Questions 14

Review the exhibit.

NSK200 Question 14

You are asked to restrict users from accessing YouTube content tagged as Sport. You created the required real-time policy; however, users can still access the content

Referring to the exhibit, what is the problem?

Options:
A.

The website is in a steering policy exception.

B.

The policy changes have not been applied.

C.

The YouTube content cannot be controlled.

D.

The traffic matched a Do Not Decrypt policy

Questions 15

Your team is asked to investigate ten Netskope DLP incidents. You want to assign these incidents among different team members.

Options:
A.

Use your ticketing tool.

B.

Use the Forensic Incident workflow.

C.

Use the DLP Incident workflow.

D.

Use the Quarantine Incident workflow.

Questions 16

Netskope support advised you to enable DTLS for belter performance. You added firewall rules to allow UDP port 443 traffic. These settings are part of which configuration element when enabled in the Netskope tenant?

Options:
A.

Real-time Protection policies

B.

SSL decryption policies

C.

steering configuration

D.

client configuration

Questions 17

The risk team at your company has determined that traffic from the sales team to a custom Web application should not be inspected by Netskope. All other traffic to the Web application should continue to be inspected. In this scenario, how would you accomplish this task?

Options:
A.

Create a Do Not Decrypt Policy using User Group and Domain in the policy page.

B.

Create a Do Not Decrypt Policy using Application in the policy page and a Steering Exception for Group

C.

Create a Do Not Decrypt Policy using Destination IP and Application in the policy page.

D.

Create a Do Not Decrypt Policy using Source IP and Application in the policy page.

Questions 18

You have deployed a development Web server on a public hosting service using self-signed SSL certificates. After some troubleshooting, you determined that when the Netskope client is enabled, you are unable to access the Web server over SSL. The default Netskope tenant steering configuration is in place.

In this scenario, which two settings are causing this behavior? (Choose two.)

Options:
A.

SSL pinned certificates are blocked.

B.

Untrusted root certificates are blocked.

C.

Incomplete certificate trust chains are blocked.

D.

Self-signed server certificates are blocked.

Questions 19

You are testing policies using the DLP predefined identifier "Card Numbers (Major Networks; all)." No DLP policy hits are observed.

Options:
A.

You must use Netskope API protection.

B.

Your data must have valid credit card numbers.

C.

You must normalize credit card numbers to 16-digit consecutive numbers.

D.

You must use the Netskope client to perform advanced DLP and optical character recognition.

Questions 20

You are comparing the behavior of Netskope's Real-time Protection policies to API Data Protection policies. In this Instance, which statement is correct?

Options:
A.

All real-time policies are enforced, regardless of sequential order, while API policies are analyzed sequentially from top to bottom and stop once a policy Is matched.

B.

Both real-time and API policies are analyzed sequentially from top to bottom and stop once a policy Is matched.

C.

All API policies are enforced, regardless of sequential order, while real-time policies are analyzed sequentially from top to bottom and stop once a policy Is matched.

D.

Both real-time and API policies are all enforced, regardless of sequential order.

Exam Code: NSK200
Certification Provider: Netskope
Exam Name: Netskope Certified Cloud Security Integrator (NCCSI)
Last Update: May 13, 2025
Questions: 93

Netskope Free Exams

Netskope Free Exams
Examstrack provides free Netskope exam prep materials and practice tests to support your Netskope certification goals.