Review the exhibit.You work for a medical insurance provider. You have Netskope Next Gen Secure Web Gateway deployed to all managed user devices with limited block policies. Your manager asks that you begin blocking Cloud Storage applications that are not HIPAA compliant. Prior to implementing this policy, you want to verify that no business or departmental applications would be blocked by this policy.Referring to the exhibit, which query would you use in the Edit Widget window to narrow down the results?
A hospital has a patient form that they share with their patients over Gmail. The blank form can be freely shared among anyone. However, if the form has any information filled out, the document is considered confidential.Which rule type should be used in the DLP profile to match such a document?
You have an NG-SWG customer that currently steers all Web traffic to Netskope using the Netskope Client. They have identified one new native application on Windows devices that is a certificate-pinned application. Users are not able to access the application due to certificate pinning. The customer wants to configure the Netskope Client so that the traffic from the application is steered to Netskope and the application works as expected.Which two methods would satisfy the requirements? (Choose two.)
You are the network architect for a company using Netskope Private Access. Multiple users are reporting that they are unable to access an application using Netskope Private Access that was working previously. You have verified that the Real-time Protection policy allows access to the application, private applications are steered for the users, and the application is reachable from internal machines. You must verify that the application is reachable through Netskope Publisher.In this scenario, which two tools in the Netskope UI would you use to accomplish this task? (Choose two.)
You deployed Netskope Cloud Security Posture Management (CSPM) using pre-defined benchmark rules to monitor your cloud posture in AWS. Azure, and GCP You are asked to assess if you can extend the Netskope CSPM solution by creating custom rules for each environment.Which statement is correct?
What are three valid Instance Types for supported SaaS applications when using Netskope’s API-enabled Protection? (Choose three.)