New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Netskope NSK101 Exam - Topic 5 Question 44 Discussion

Actual exam question for Netskope's NSK101 exam
Question #: 44
Topic #: 5
[All NSK101 Questions]

In the Tenant III, which two methods would an administrator use to update a File Profile with malicious file hashes? (Choose two)

Show Suggested Answer Hide Answer
Suggested Answer: A, C

To update a File Profile with malicious file hashes in the Netskope platform, an administrator can use the following methods:

Upload a CSV file of malicious file hashes: Administrators can prepare a CSV file containing the malicious file hashes and upload it to the platform. This method allows for bulk updates of the file profile with multiple hashes at once.

Input a list of malicious file hashes: Administrators can manually input a list of malicious file hashes directly into the platform. This method is useful for adding individual hashes or making small updates to the file profile.

These methods ensure that the file profile is updated with the latest malicious file information, enabling the platform to detect and block known threats effectively.


Netskope documentation on managing File Profiles and updating them with malicious file hashes.

Instructions and best practices for uploading and managing threat intelligence data within the Netskope platform.

Contribute your Thoughts:

0/2000 characters
Shoshana
3 days ago
A and D, easy peasy. Who needs C when you've got CSV and JSON?
upvoted 0 times
...
Louvenia
8 days ago
I think B and D are the way to go. Gotta cover all the bases, you know?
upvoted 0 times
...
Goldie
13 days ago
A and C are the correct answers.
upvoted 0 times
...
Mona
18 days ago
I’m leaning towards uploading a CSV and inputting a list, but I’m a bit confused about the JSON part.
upvoted 0 times
...
Jennifer
23 days ago
I feel like creating a Threat Protection Profile is definitely an option, but I can't recall if we can upload JSON files too.
upvoted 0 times
...
Bong
29 days ago
I remember practicing a question similar to this, and I think inputting a list of malicious file hashes could be one of the methods.
upvoted 0 times
...
Rashida
1 month ago
I think we might need to upload a CSV file of malicious file hashes, but I'm not entirely sure about the second option.
upvoted 0 times
...
Brock
1 month ago
I'm not totally sure about this, but I think B and D might be the way to go.
upvoted 0 times
...
Sabra
1 month ago
I've got this! The answer is A and C, for sure.
upvoted 0 times
...
Willard
2 months ago
I'm a bit confused on this one. Can someone explain the difference between the methods?
upvoted 0 times
...
Rochell
2 months ago
Okay, I think I know the answer here. Let me just double-check the options.
upvoted 0 times
...
Gene
2 months ago
Hmm, this seems like a tricky one. I'll need to think carefully about the options.
upvoted 0 times
...

Save Cancel