How should an administrator handle a cloud application that fails to meet compliance requirements, but the business need outweighs the risk?A . SanctionB . MonitorC . BlockD . Review View Answer Answer: D...
Continue readingWhat module should an administrator use to create policies with one click, and send them to the Protect Module?
What module should an administrator use to create policies with one click, and send them to the Protect Module?A . DetectB . InvestigateC . AuditD . Securlet View Answer Answer: D...
Continue readingWhat module should an administrator use to create policies that restrict users from sharing data in unsafe ways?
What module should an administrator use to create policies that restrict users from sharing data in unsafe ways?A . SecurletsB . AuditC . ProtectD . Detect View Answer Answer: C...
Continue readingHow does the Detect module get data?
How does the Detect module get data?A . Firewalls and proxiesB . CloudSOC gateway and cloud application APIsC . Firewalls and proxies, and CloudSOC gatewayD . Cloud application APIs View Answer Answer: C...
Continue readingWhat data source types does Audit support?
What data source types does Audit support?A . SSH, FTP, Remote desktopB . Web upload, SFTP, S3C . PDF, DOC, XLSD . APIs View Answer Answer: C...
Continue readingWhich CloudSOC module(s) use firewalls and proxies as data sources?
Refer to the exhibit. Which CloudSOC module(s) use firewalls and proxies as data sources?A . Detect, Protect, and InvestigateB . Detect, Protect, Investigate, and SecurletsC . Audit and InvestigateD . Audit View Answer Answer: C Explanation: Reference: https://www.niwis.com/downloads/Symantec/Symantec_CloudSOC.pdf...
Continue readingWhat type of policy should an administrator create to get email notifications if the incident happens again?
Refer to the exhibit. An administrator found this incident in the Investigate module. What type of policy should an administrator create to get email notifications if the incident happens again?A . File sharing policyB . File transfer policyC . Access monitoring policyD . Data exposure policy View Answer Answer: B...
Continue readingWhat module should an administrator use to identify anomalous user behavior such as large amounts of data being downloaded, too many files being shared, or logins from suspicious locations?
What module should an administrator use to identify anomalous user behavior such as large amounts of data being downloaded, too many files being shared, or logins from suspicious locations?A . DetectB . ProtectC . InvestigateD . Audit View Answer Answer: A Explanation: Reference: http://www.arrowecs.pt/ficheros/ partners/211_ShadowDataReport_1H_2016_Digital_Screen_compressed.pdf...
Continue readingWhat Business Readiness Rating (BRR) category does the subcategory “Password Quality Rules” belong to?
What Business Readiness Rating (BRR) category does the subcategory “Password Quality Rules” belong to?A . DataB . ComplianceC . BusinessD . Access View Answer Answer: D...
Continue readingWhat modules are used in the use case “Protect information from accidental and intentional exposure within cloud applications”?
Refer to the exhibit. What modules are used in the use case “Protect information from accidental and intentional exposure within cloud applications”?A . Protect and InvestigateB . Protect, Investigate, and SecurletsC . Protect and AuditD . Protect and Securlets View Answer Answer: A...
Continue reading