Exam4Training

Symantec 250-437 Administration of Symantec CloudSOC Online Training

Question #1

How does the Audit module get data?

  • A . Firewalls and proxies
  • B . Cloud application APIs
  • C . CloudSOC gateway
  • D . Manual uploads

Reveal Solution Hide Solution

Correct Answer: A
Question #2

Which detector will trigger if CloudSOC detects anomalously frequent sharing?

  • A . Behavior based
  • B . Threshold based
  • C . Sequence based
  • D . Threats based

Reveal Solution Hide Solution

Correct Answer: D
Question #3

Which are three (3) levels of data exposure?

  • A . Public, external, and internal
  • B . Public, confidential, and company confidential
  • C . Public, semi-private, and private
  • D . Public, confidential, and private

Reveal Solution Hide Solution

Correct Answer: A
Question #4

Refer to the exhibit.

Which CloudSOC module(s) use firewalls and proxies as data sources?

  • A . Detect, Protect, and Investigate
  • B . Detect, Protect, Investigate, and Securlets
  • C . Audit and Investigate
  • D . Audit

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://www.niwis.com/downloads/Symantec/Symantec_CloudSOC.pdf

Question #5

How should an administrator handle a cloud application that fails to meet compliance requirements, but the business need outweighs the risk?

  • A . Sanction
  • B . Monitor
  • C . Block
  • D . Review

Reveal Solution Hide Solution

Correct Answer: D
Question #6

Refer to the exhibit.

What modules are used in the use case “Protect information from accidental and intentional exposure within cloud applications”?

  • A . Protect and Investigate
  • B . Protect, Investigate, and Securlets
  • C . Protect and Audit
  • D . Protect and Securlets

Reveal Solution Hide Solution

Correct Answer: A
Question #7

What type of policy should an administrator use to prevent a user that is behaving in anomalous ways from sharing public links while you monitor them?

  • A . Access monitoring
  • B . File transfer
  • C . Data exposure
  • D . Access enforcement

Reveal Solution Hide Solution

Correct Answer: D
Question #8

What is the objective of File Sharing policies?

  • A . To restrict the direct sharing of documents from cloud applications based both on their content and the characteristics of the user.
  • B . To prevent users from sharing documents, either publicly, externally, or internally.
  • C . To notify an administrator when activities, such as objects being modified, are performed in a cloud application.
  • D . To restrict the uploading and downloading of documents from the user’s computer to the cloud application, based both on the content of the documents, and the characteristics of the user.

Reveal Solution Hide Solution

Correct Answer: A
Question #9

Refer to the exhibit.

Which modules are used in the use case “Determine optimal cloud application adoption based on business risk and cost of ownership”?

  • A . Audit and Protect
  • B . Audit
  • C . Detect, Protect, and Investigate
  • D . Protect, Investigate, and Securlets

Reveal Solution Hide Solution

Correct Answer: B
Question #10

Refer to the exhibit.

An administrator found this incident in the Investigate module.

What type of policy should an administrator create to get email notifications if the incident happens again?

  • A . File sharing policy
  • B . File transfer policy
  • C . Access monitoring policy
  • D . Data exposure policy

Reveal Solution Hide Solution

Correct Answer: B

Question #11

Which CloudSOC module is similar to a Data Loss Prevention (DLP) system?

  • A . Detect
  • B . Investigate
  • C . Audit
  • D . Protect

Reveal Solution Hide Solution

Correct Answer: A
Question #12

What data source types does Audit support?

  • A . SSH, FTP, Remote desktop
  • B . Web upload, SFTP, S3
  • C . PDF, DOC, XLS
  • D . APIs

Reveal Solution Hide Solution

Correct Answer: C
Question #13

What module should an administrator use to create policies that restrict users from sharing data in unsafe ways?

  • A . Securlets
  • B . Audit
  • C . Protect
  • D . Detect

Reveal Solution Hide Solution

Correct Answer: C
Question #14

What compensatory control should an administrator implement if password quality rules of a cloud application has a low rating?

  • A . Single Sign On (SSO)
  • B . Block the application
  • C . Role based access
  • D . Biometric access

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: https://www.symantec.com/content/dam/symantec/docs/solution-briefs/shadow-it-discovery­best-practices-guide-en.pdf

Question #15

What CloudSOC module should an administrator use to identify and remediate malicious behavior within cloud applications?

  • A . Audit
  • B . Securlets
  • C . Detect
  • D . Investigate

Reveal Solution Hide Solution

Correct Answer: C
Question #16

What modules are used in the use case “Identify and remediate malicious behavior within cloud applications”?

  • A . Detect, Protect, and Investigate
  • B . Detect and Investigate
  • C . Detect
  • D . Detect and Securlets

Reveal Solution Hide Solution

Correct Answer: D
Question #17

Refer to the exhibit.

Which module(s) use the CloudSOC gateway as a data source?

  • A . Audit
  • B . Detect and Protect
  • C . Detect, Protect, and Investigate
  • D . Detect, Protect, Investigate, and Securlets

Reveal Solution Hide Solution

Correct Answer: B
Question #18

What type of policy should an administrator utilize to prevent the spread of malware through cloud applications?

  • A . Access monitoring
  • B . File transfer
  • C . File sharing
  • D . Access enforcement

Reveal Solution Hide Solution

Correct Answer: A
Question #19

Which type of a policy can perform a user log out from Single Sign On?

  • A . Access Monitoring policy
  • B . ThreatScore based policy
  • C . Access enforcement policy
  • D . None of the above

Reveal Solution Hide Solution

Correct Answer: D
Question #20

How does the Detect module get data?

  • A . Firewalls and proxies
  • B . CloudSOC gateway and cloud application APIs
  • C . Firewalls and proxies, and CloudSOC gateway
  • D . Cloud application APIs

Reveal Solution Hide Solution

Correct Answer: C

Question #21

What type of solution should an administrator implement to secure the way users interact with cloud applications?

  • A . Intrusion Detection System/Intrusion Protection System (IDS/IPS)
  • B . Cloud Access Security Broker (CASB)
  • C . Web application firewalls
  • D . Proxies

Reveal Solution Hide Solution

Correct Answer: B
Question #22

What policy should an administrator utilize to allow users access to Office 365, but prevent the extraction of files when their ThreatScore is higher than 30?

  • A . File transfer
  • B . Access enforcement
  • C . ThreatScore based
  • D . Data exposure

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

Reference: https://support.symantec.com/en_US/article.ALERT2395.html

Question #23

What Business Readiness Rating (BRR) category does the subcategory “Password Quality Rules” belong to?

  • A . Data
  • B . Compliance
  • C . Business
  • D . Access

Reveal Solution Hide Solution

Correct Answer: D
Question #24

How does the Securlet module get data?

  • A . Firewall and proxies
  • B . CloudSOC gateway
  • C . Cloud application APIs
  • D . CloudSOC gateway and cloud application APIs

Reveal Solution Hide Solution

Correct Answer: D
Question #25

What module should an administrator use to identify anomalous user behavior such as large amounts of data being downloaded, too many files being shared, or logins from suspicious locations?

  • A . Detect
  • B . Protect
  • C . Investigate
  • D . Audit

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

Reference: http://www.arrowecs.pt/ficheros/ partners/211_ShadowDataReport_1H_2016_Digital_Screen_compressed.pdf

Question #26

Which detector will trigger if a user attempts a series of invalid logins within a specific time period?

  • A . Threats based
  • B . Sequence based
  • C . Threshold based
  • D . Behavior based

Reveal Solution Hide Solution

Correct Answer: C
Question #27

What module should an administrator use to view all activities in cloud applications?

  • A . Protect
  • B . Audit
  • C . Detect
  • D . Investigate

Reveal Solution Hide Solution

Correct Answer: A
Question #28

What module should an administrator use to create policies with one click, and send them to the Protect Module?

  • A . Detect
  • B . Investigate
  • C . Audit
  • D . Securlet

Reveal Solution Hide Solution

Correct Answer: D
Question #29

What module can an administrator use to connect certain cloud applications to CloudSOC via APIs, and have complete visibility into the content being shared in those cloud applications?

  • A . Investigate
  • B . Detect
  • C . Protect
  • D . Securlets

Reveal Solution Hide Solution

Correct Answer: D
Question #30

Refer to the exhibit.

What modules are used by the use case “Identify and determine business risk of cloud applications being used within the organization”?

  • A . Investigate
  • B . Audit and Investigate
  • C . Audit
  • D . Audit and Securlets

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version