New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Netskope NSK101 Exam - Topic 2 Question 29 Discussion

Actual exam question for Netskope's NSK101 exam
Question #: 29
Topic #: 2
[All NSK101 Questions]

You are setting up a real-time threat protection policy for patient zero to block previously unseen files until a benign verdict is produced by the Netskope Threat Protection Service. In this scenario, which two policy parameters must you configure? (Choose two)

Show Suggested Answer Hide Answer
Suggested Answer: A, D

To set up a real-time threat protection policy for patient zero to block previously unseen files until a benign verdict is produced by the Netskope Threat Protection Service, you need to configure the following parameters:

Block Action: This action ensures that any previously unseen file is blocked until it has been analyzed and a verdict has been reached. By blocking the file, the policy prevents potential threats from entering the network until they are deemed safe.

Remediation Profile: This profile defines the actions to be taken when a threat is detected. It includes configuring the alerts and responses (such as notifying administrators) when a file is blocked. This ensures that there is a process in place for handling detected threats and that appropriate measures are taken.


Netskope Threat Protection documentation detailing the setup of real-time threat protection policies.

Configuration guides for policy actions and remediation profiles in the Netskope platform.

Contribute your Thoughts:

0/2000 characters
Ma
3 months ago
I agree, the remediation profile could be important too!
upvoted 0 times
...
Harris
3 months ago
Wait, are we really blocking unseen files? That seems risky!
upvoted 0 times
...
Minna
3 months ago
Not sure about the CCL destination criterion being necessary here.
upvoted 0 times
...
Jeff
4 months ago
I think the file type activity constraint is also crucial.
upvoted 0 times
...
Maybelle
4 months ago
Definitely need the block action for this!
upvoted 0 times
...
Justine
4 months ago
I feel like the CCL destination criterion might not be necessary for this scenario. It seems more focused on the action and constraints instead.
upvoted 0 times
...
Mayra
4 months ago
I practiced a similar question where we had to choose parameters for a threat protection policy. I think the remediation profile might be relevant, but I'm not entirely sure.
upvoted 0 times
...
Lazaro
4 months ago
I'm a bit unsure about the second parameter. I remember something about file type constraints, but I can't recall if that's the right choice here.
upvoted 0 times
...
Delmy
5 months ago
I think we definitely need to set the block action to prevent those unseen files from executing. That seems like a key step.
upvoted 0 times
...
Shonda
5 months ago
The key is focusing on the "real-time threat protection policy" and "block previously unseen files" details. I think block action and remediation profile are the two parameters we need to configure.
upvoted 0 times
...
Lucy
5 months ago
Hmm, I'm a bit unsure about the CCL destination criterion and file type activity constraint. I'll have to re-read the question carefully to determine if those are also required.
upvoted 0 times
...
Nickole
5 months ago
I'm pretty confident the answer is block action and remediation profile. Those seem like the most relevant options for this scenario.
upvoted 0 times
...
Judy
5 months ago
Okay, let's think this through step-by-step. We need to configure two policy parameters to set up the real-time threat protection policy.
upvoted 0 times
...
Anisha
5 months ago
This question seems straightforward, but I want to make sure I understand the key details before answering.
upvoted 0 times
...
Billi
1 year ago
Wait, is the answer 'all of the above'? I mean, who doesn't love a good threat protection policy with a side of comedy?
upvoted 0 times
Yolando
1 year ago
D) remediation profile
upvoted 0 times
...
Yolando
1 year ago
A) block action
upvoted 0 times
...
...
Buffy
1 year ago
I'm gonna go with B and D. Gotta set that remediation profile, and don't forget the CCL destination. What could possibly go wrong?
upvoted 0 times
...
Goldie
1 year ago
Oh snap, I totally got this. A and C, no doubt. Blocking the files and setting the file type constraints, that's the way to go!
upvoted 0 times
Noel
1 year ago
User 2: Agreed, blocking the files and setting file type constraints is the best approach.
upvoted 0 times
...
Susy
1 year ago
User 1: I think we should go with A and C for the policy parameters.
upvoted 0 times
...
...
Clorinda
1 year ago
I'm not sure about file type activity constraint. I think we should also consider configuring remediation profile.
upvoted 0 times
...
Magda
1 year ago
This is easy, it's B and C. You need to configure the CCL destination and file type to keep those threats at bay!
upvoted 0 times
Tarra
1 year ago
User 3: Got it, let's configure the policy with those settings to protect patient zero.
upvoted 0 times
...
Christiane
1 year ago
User 2: Yeah, that makes sense. Those parameters will help block any unseen files until we get a benign verdict.
upvoted 0 times
...
Hubert
1 year ago
User 1: I think it's B and C, we need to set up the CCL destination and file type activity constraint.
upvoted 0 times
...
...
Ettie
1 year ago
I agree with Joanna. Those parameters will help us block unseen files until a benign verdict is produced.
upvoted 0 times
...
Octavio
1 year ago
Hmm, let's see... I think the answer is A and D. Gotta block those pesky files until they're proven safe, right?
upvoted 0 times
Huey
1 year ago
Sina: Absolutely, those two parameters are key for keeping patient zero safe.
upvoted 0 times
...
Sina
1 year ago
Xuan: And don't forget about configuring the remediation profile to handle any potential threats.
upvoted 0 times
...
Xuan
1 year ago
User 2: Yeah, setting up a block action is crucial for real-time threat protection.
upvoted 0 times
...
Shantay
1 year ago
User 1: I agree, we definitely need to block those files until we know they're safe.
upvoted 0 times
...
...
Joanna
1 year ago
I think we should configure block action and file type activity constraint.
upvoted 0 times
...

Save Cancel