<< Prev Question Next Question >>

Question 16/49

You determine that a business application uses non-standard HTTPS ports. You want to steer all HTTPS traffic for this application and have visibility and control over user activities.
Which action will allow you to accomplish this task?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (49q)
Question 1: Which two technologies form a part of Netskope's Threat Prot...
Question 2: What are two use cases for Netskope's DLP solution? (Choose ...
Question 3: Click the Exhibit button. What are two use cases where the p...
Question 4: Click the Exhibit button. Referring to the exhibit, which st...
Question 5: You are attempting to allow access to an application using N...
Question 6: You have an issue with the Netskope client connecting to the...
Question 7: Which two statements are correct about DLP Incidents in the ...
Question 8: What is a benefit that Netskope instance awareness provides?...
Question 9: In which scenario would you use a SAML reverse proxy?...
Question 10: Your company has implemented Netskope's Cloud Firewall and r...
Question 11: You are required to create a policy that will notify and all...
Question 12: You want to use an out-of-band API connection into your sanc...
Question 13: There is a DLP violation on a file in your sanctioned Google...
Question 14: What is a benefit that Netskope instance awareness provides?...
Question 15: When would an administrator need to use a tombstone file?...
Question 16: You determine that a business application uses non-standard ...
Question 17: What are two uses for deploying a Netskope Virtual Appliance...
Question 18: Which three statements about Netskope Private Access Publish...
Question 19: As an administrator, you need to configure the Netskope Admi...
Question 20: What is the limitation of using a legacy proxy compared to N...
Question 21: You need to block all users from uploading data files into r...
Question 22: You are required to mitigate malicious scripts from being do...
Question 23: You have applied a DLP Profile to block all Personally Ident...
Question 24: Which two use cases would be considered examples of Shadow I...
Question 25: What are two fundamental differences between the inline and ...
Question 26: You just deployed the Netskope client in Web mode and severa...
Question 27: When accessing an encrypted website (HTTPS), what is a reaso...
Question 28: A customer is considering the cloud shared responsibility mo...
Question 29: What are two reasons why legacy solutions, such as on-premis...
Question 30: What are two CASB inline interception use cases? (Choose two...
Question 31: What are two supported ways to provision users to your custo...
Question 32: Users are connecting to sanctioned cloud applications from p...
Question 33: You investigate a suspected malware incident and confirm tha...
Question 34: Your department is asked to report on GDPR data publicly exp...
Question 35: You need to locate events for specific activities such as "e...
Question 36: Which two statements describe a website categorized as a dom...
Question 37: Which two cloud security and infrastructure enablement techn...
Question 38: Click the Exhibit button. (Exhibit) A user has the Netskope ...
Question 39: You want to deploy Netskope's zero trust network access (ZTN...
Question 40: You need to create a service request ticket for a client-rel...
Question 41: You are working with a large retail chain and have concerns ...
Question 42: You are working with traffic from applications with pinned c...
Question 43: A customer asks you to create several real-time policies. Po...
Question 44: Which three technologies describe the primary cloud service ...
Question 45: Which three security controls are offered by the Netskope Cl...
Question 46: A new customer is concerned about performance, especially wi...
Question 47: Exhibit (Exhibit) Which portion of the interface shown in th...
Question 48: Which two traffic steering configurations are supported by N...
Question 49: How does a cloud security solution achieve visibility into T...