How should an administrator handle a cloud application that fails to meet compliance requirements, but the business need outweighs the risk?
A . Sanction
B . Monitor
C . Block
D . Review
Answer: D
250-437 Administration of Symantec CloudSOC exam is a hot Symantec certification exam, Exam4Training offers you the latest free online 250-437 dumps to practice. You can get online training in the following questions, all these questions are verified by Symantec experts. If this exam changed, we will share new update questions.
How should an administrator handle a cloud application that fails to meet compliance requirements, but the business need outweighs the risk?
A . Sanction
B . Monitor
C . Block
D . Review
Answer: D
What module should an administrator use to create policies with one click, and send them to the Protect Module?
A . Detect
B . Investigate
C . Audit
D . Securlet
Answer: D
What module should an administrator use to create policies that restrict users from sharing data in unsafe ways?
A . Securlets
B . Audit
C . Protect
D . Detect
Answer: C
How does the Detect module get data?
A . Firewalls and proxies
B . CloudSOC gateway and cloud application APIs
C . Firewalls and proxies, and CloudSOC gateway
D . Cloud application APIs
Answer: C
What data source types does Audit support?
A . SSH, FTP, Remote desktop
B . Web upload, SFTP, S3
C . PDF, DOC, XLS
D . APIs
Answer: C
Refer to the exhibit.
Which CloudSOC module(s) use firewalls and proxies as data sources?
A . Detect, Protect, and Investigate
B . Detect, Protect, Investigate, and Securlets
C . Audit and Investigate
D . Audit
Answer: C
Explanation:
Reference: https://www.niwis.com/downloads/Symantec/Symantec_CloudSOC.pdf
Refer to the exhibit.
An administrator found this incident in the Investigate module.
What type of policy should an administrator create to get email notifications if the incident happens again?
A . File sharing policy
B . File transfer policy
C . Access monitoring policy
D . Data exposure policy
Answer: B
What module should an administrator use to identify anomalous user behavior such as large amounts of data being downloaded, too many files being shared, or logins from suspicious locations?
A . Detect
B . Protect
C . Investigate
D . Audit
Answer: A
Explanation:
Reference: http://www.arrowecs.pt/ficheros/ partners/211_ShadowDataReport_1H_2016_Digital_Screen_compressed.pdf
What Business Readiness Rating (BRR) category does the subcategory “Password Quality Rules” belong to?
A . Data
B . Compliance
C . Business
D . Access
Answer: D
Refer to the exhibit.
What modules are used in the use case “Protect information from accidental and intentional exposure within cloud applications”?
A . Protect and Investigate
B . Protect, Investigate, and Securlets
C . Protect and Audit
D . Protect and Securlets
Answer: A