Which CloudSOC module is similar to a Data Loss Prevention (DLP) system?

Which CloudSOC module is similar to a Data Loss Prevention (DLP) system?A . DetectB . InvestigateC . AuditD . ProtectView AnswerAnswer: A

September 2, 2019 No Comments READ MORE +

What module can an administrator use to connect certain cloud applications to CloudSOC via APIs, and have complete visibility into the content being shared in those cloud applications?

What module can an administrator use to connect certain cloud applications to CloudSOC via APIs, and have complete visibility into the content being shared in those cloud applications?A . InvestigateB . DetectC . ProtectD . SecurletsView AnswerAnswer: D

September 1, 2019 No Comments READ MORE +

What modules are used by the use case “Identify and determine business risk of cloud applications being used within the organization”?

Refer to the exhibit. What modules are used by the use case “Identify and determine business risk of cloud applications being used within the organization”?A . InvestigateB . Audit and InvestigateC . AuditD . Audit and SecurletsView AnswerAnswer: B

August 31, 2019 No Comments READ MORE +

What compensatory control should an administrator implement if password quality rules of a cloud application has a low rating?

What compensatory control should an administrator implement if password quality rules of a cloud application has a low rating?A . Single Sign On (SSO)B . Block the applicationC . Role based accessD . Biometric accessView AnswerAnswer: A Explanation: Reference: https://www.symantec.com/content/dam/symantec/docs/solution-briefs/shadow-it-discovery­best-practices-guide-en.pdf

August 30, 2019 No Comments READ MORE +

What module should an administrator use to view all activities in cloud applications?

What module should an administrator use to view all activities in cloud applications?A . ProtectB . AuditC . DetectD . InvestigateView AnswerAnswer: A

August 29, 2019 No Comments READ MORE +

Which modules are used in the use case “Determine optimal cloud application adoption based on business risk and cost of ownership”?

Refer to the exhibit. Which modules are used in the use case “Determine optimal cloud application adoption based on business risk and cost of ownership”?A . Audit and ProtectB . AuditC . Detect, Protect, and InvestigateD . Protect, Investigate, and SecurletsView AnswerAnswer: B

August 28, 2019 No Comments READ MORE +

What type of policy should an administrator use to prevent a user that is behaving in anomalous ways from sharing public links while you monitor them?

What type of policy should an administrator use to prevent a user that is behaving in anomalous ways from sharing public links while you monitor them?A . Access monitoringB . File transferC . Data exposureD . Access enforcementView AnswerAnswer: D

August 25, 2019 No Comments READ MORE +

What type of solution should an administrator implement to secure the way users interact with cloud applications?

What type of solution should an administrator implement to secure the way users interact with cloud applications?A . Intrusion Detection System/Intrusion Protection System (IDS/IPS)B . Cloud Access Security Broker (CASB)C . Web application firewallsD . ProxiesView AnswerAnswer: B

August 24, 2019 No Comments READ MORE +

Which are three (3) levels of data exposure?

Which are three (3) levels of data exposure?A . Public, external, and internalB . Public, confidential, and company confidentialC . Public, semi-private, and privateD . Public, confidential, and privateView AnswerAnswer: A

August 24, 2019 No Comments READ MORE +

How does the Securlet module get data?

How does the Securlet module get data?A . Firewall and proxiesB . CloudSOC gatewayC . Cloud application APIsD . CloudSOC gateway and cloud application APIsView AnswerAnswer: D

August 23, 2019 No Comments READ MORE +