Free Netskope NSK300 Exam Actual Questions

The questions for NSK300 were last updated On Sep 16, 2024

Question No. 1

Your CISO asks that you to provide a report with a visual representation of the top 10 applications (by number of objects) and their risk score. As the administrator, you decide to use a Sankey visualization in Advanced Analytics to represent the data in an efficient manner.

In this scenario, which two field types are required to produce a Sankey Tile in your report? {Choose two.)

Show Answer Hide Answer
Correct Answer: A, B

To produce a Sankey Tile in a report that visually represents the top 10 applications by number of objects and their risk score, you would need:

Dimension (A): This field type would be used to represent the nodes in the Sankey visualization, which could be the applications in this case1.

Measure (B): This field type would provide the weight of the links between the nodes, representing the number of objects or the risk score associated with each application1.

These two field types are essential for creating a Sankey visualization as they define the structure and flow of data between different stages or categories within the visualization.


Question No. 2

You have an NG-SWG customer that currently steers all Web traffic to Netskope using the Netskope Client. They have identified one new native application on Windows devices that is a certificate-pinned application. Users are not able to access the application due to certificate pinning. The customer wants to configure the Netskope Client so that the traffic from the application is steered to Netskope and the application works as expected.

Which two methods would satisfy the requirements? (Choose two.)

Show Answer Hide Answer
Correct Answer: B, C

To address the issue of a certificate-pinned application not being accessible due to certificate pinning, while still steering the traffic to Netskope, the two methods that would satisfy the requirements are:

B: Configure the SSL Do Not Decrypt policy to not decrypt traffic for domains used by the native application. This ensures that the SSL traffic for the specified domains is not decrypted, thus avoiding issues with certificate pinning.

C: Configure domain exceptions in the steering configuration for the domains used by the native application. By setting domain exceptions, traffic to these domains will bypass SSL decryption, allowing the certificate-pinned application to function as expected1.

These methods are in line with Netskope's capabilities for handling certificate-pinned applications, which often require bypassing decryption to prevent breaking the application's functionality due to its security features1.


Question No. 3

Your company just had a new Netskope tenant provisioned and you are asked to create a secure tenant configuration. In this scenario, which two default settings should you change? {Choose two.)

Show Answer Hide Answer
Question No. 4

You are troubleshooting an issue with users who are unable to reach a financial SaaS application when their traffic passes through Netskope. You determine that this is because of IP restrictions in place with the SaaS vendor. You are unable to add Netskope's IP ranges at this time, but need to allow the traffic.

How would you allow this traffic?

Show Answer Hide Answer
Question No. 5

Your customer is currently using Directory Importer with Active Directory (AD) to provision users to Nelskope. They have recently acquired three new companies (

Show Answer Hide Answer