In which two scenarios would you use SD-WAN technology? (Choose two.)
Answer : B, D
SD-WAN technology is used in the following scenarios:
To optimize utilization and performance across multiple Internet connections:
SD-WAN allows organizations to aggregate multiple Internet connections and optimize traffic flow based on application requirements and network conditions. This improves overall network performance and ensures efficient use of available bandwidth.
To replace dedicated MPLS connections with multiple broadband WAN and mobile options:
SD-WAN provides the flexibility to use a mix of broadband, LTE, and other connectivity options to replace traditional MPLS circuits. This can significantly reduce costs and improve agility in network deployment and management.
Netskope Knowledge Portal: SD-WAN Integration
Netskope Knowledge Portal: Benefits of SD-WAN
Which three technologies describe the primary cloud service models as defined by the National Institute of Standards and Technology (NIST)? (Choose three.)
Answer : C, D, E
The three technologies that describe the primary cloud service models as defined by the National Institute of Standards and Technology (NIST) are Platform as a Service (PaaS), Software as a Service (SaaS), and Infrastructure as a Service (IaaS). These service models are based on the type of computing capability that is provided by the cloud provider to the cloud consumer over a network. According to NIST, these service models have the following definitions:
Platform as a Service (PaaS): The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
Software as a Service (SaaS): The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
Infrastructure as a Service (IaaS): The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).
What is the limitation of using a legacy proxy compared to Netskope's solution?
Answer : D
A limitation of using a legacy proxy compared to Netskope's solution is that to enforce policies, traffic needs to traverse back through a customer's on-premises security stack. This creates latency, bandwidth, and scalability issues for remote users and cloud applications. Netskope's solution, on the other hand, leverages a cloud-native architecture that provides high-performance and scalable inspection of traffic from any location and device.Reference:[Netskope Architecture Overview]
All users are going through Netskope's Next Gen SWG. Your CISO requests a monthly report of all users who are accessing cloud applications with a "Low" or a "Poor" CCL, where the activity is either "Edit" or "Upload".
Using the Advanced Analytics interface, which two statements describe which actions must be performed in this scenario? (Choose two.)
Answer : A, B
Create the Report in Advanced Analytics:
Data Collection:
Use the 'Page Events' data collection, which captures detailed user activities on web pages, including edits and uploads.
Filters:
Apply filters to include only the activities 'Edit' and 'Upload'.
Add another filter for the Cloud Confidence Level (CCL) to include only those with 'Low' or 'Poor' ratings.
This ensures the report focuses on the specified user activities within cloud applications that have lower security ratings.
Steps:
Navigate to Advanced Analytics > Reports.
Create a new report and select 'Page Events' as the data collection source.
Apply the necessary filters for activities and CCL values.
Schedule the Report:
Monthly Recurrence:
Set the report to run on a monthly schedule to ensure regular updates.
Configure the report to be sent via email with a PDF attachment.
Steps:
In the report scheduling options, set the recurrence to monthly.
Specify the email recipients, ensuring the CISO receives the report.
Select PDF as the report format.
Reference:
For more details on creating and scheduling reports, refer to the Netskope documentation on Advanced Analytics and report generation.
You have applied a DLP Profile to block all Personally Identifiable Information data uploads to Microsoft 365 OneDrive. DLP Alerts are not displayed and no OneDrive-related activities are displayed in the Skope IT App Events table.
In this scenario, what are two possible reasons for this issue? (Choose two.)
Answer : A, B
If the Cloud Storage category is in the Steering Configuration as an exception, then Netskope will not steer any traffic to or from cloud storage applications, such as Microsoft 365 OneDrive, to its platform. This means that Netskope will not be able to inspect or apply any policies to this traffic, including DLP policies. Similarly, if the destination domain is excluded from decryption in the decryption policy, then Netskope will not decrypt any traffic to or from that domain, such as onedrive.com. This means that Netskope will not be able to inspect or apply any policies to this traffic, including DLP policies. The location of the Netskope POP or the use of IPsec as a steering option do not affect the application of DLP policies, as long as Netskope can steer and decrypt the relevant traffic.Reference:Netskope Security Cloud Operation & Administration (NSCO&A) - Classroom Course, Module 3: Steering Configuration, Lesson 1: Steering Options and Lesson 2: Exceptions; Module 4: Decryption Policy, Lesson 1: Decryption Policy Overview and Lesson 2: Decryption Policy Configuration.
: https://www.bsimm.com/ : https://www.iso.org/isoiec-27001-information-security.html : https://www.dasca.org/ : https://www.nist.gov/cyberframework
A customer is considering the cloud shared responsibility model.
In this scenario, which two criteria become the customer's responsibility? (Choose two.)
Answer : A, D
In the context of the cloud shared responsibility model, the customer's responsibilities include:
Controlling access:
Customers must manage access controls to ensure that only authorized users can access their data and applications. This includes implementing identity and access management (IAM) policies, multi-factor authentication (MFA), and regular auditing of access permissions.
Preventing data leakage:
Customers are responsible for implementing data loss prevention (DLP) strategies to protect sensitive information from unauthorized access, disclosure, or exfiltration. This involves configuring and monitoring DLP policies, encryption, and other security measures.
These responsibilities are critical for maintaining the security and integrity of data in the cloud, complementing the cloud provider's responsibilities for the infrastructure and services.
Netskope Knowledge Portal: Cloud Security
Shared Responsibility Model
A customer wants to receive e-mail alerts whenever Netskope publishes an incident involving a specific service, or if Netskope publishes information regarding planned maintenance. Which two Netskope sites allow an administrator to subscribe to service notifications? (Choose two.)
Answer : A, D
Administrators can subscribe to service notifications, including incidents and planned maintenance, through the following Netskope sites:
https://notify.netskope.com: This site provides notifications about incidents and maintenance updates. Administrators can subscribe to receive email alerts whenever there are updates involving specific services or planned maintenance.
https://trust.netskope.com: This site offers detailed information about Netskope's operational status, including any incidents, planned maintenance, and security updates. Administrators can subscribe to receive notifications and stay informed about the service status.
Netskope documentation and support articles on subscribing to service notifications and updates.
Netskope's service notification and operational status sites providing subscription options for alerts and updates.