Which module(s) use the CloudSOC gateway as a data source?

Refer to the exhibit. Which module(s) use the CloudSOC gateway as a data source?A . AuditB . Detect and ProtectC . Detect, Protect, and InvestigateD . Detect, Protect, Investigate, and SecurletsView AnswerAnswer: B

August 23, 2019 No Comments READ MORE +

Which type of a policy can perform a user log out from Single Sign On?

Which type of a policy can perform a user log out from Single Sign On?A . Access Monitoring policyB . ThreatScore based policyC . Access enforcement policyD . None of the aboveView AnswerAnswer: D

August 19, 2019 No Comments READ MORE +

What is the objective of File Sharing policies?

What is the objective of File Sharing policies?A . To restrict the direct sharing of documents from cloud applications based both on their content and the characteristics of the user.B . To prevent users from sharing documents, either publicly, externally, or internally.C . To notify an administrator when activities, such...

August 16, 2019 No Comments READ MORE +

What type of policy should an administrator utilize to prevent the spread of malware through cloud applications?

What type of policy should an administrator utilize to prevent the spread of malware through cloud applications?A . Access monitoringB . File transferC . File sharingD . Access enforcementView AnswerAnswer: A

August 16, 2019 No Comments READ MORE +

Which detector will trigger if CloudSOC detects anomalously frequent sharing?

Which detector will trigger if CloudSOC detects anomalously frequent sharing?A . Behavior basedB . Threshold basedC . Sequence basedD . Threats basedView AnswerAnswer: D

August 16, 2019 No Comments READ MORE +

What CloudSOC module should an administrator use to identify and remediate malicious behavior within cloud applications?

What CloudSOC module should an administrator use to identify and remediate malicious behavior within cloud applications?A . AuditB . SecurletsC . DetectD . InvestigateView AnswerAnswer: C

August 11, 2019 No Comments READ MORE +

What modules are used in the use case “Identify and remediate malicious behavior within cloud applications”?

What modules are used in the use case “Identify and remediate malicious behavior within cloud applications”?A . Detect, Protect, and InvestigateB . Detect and InvestigateC . DetectD . Detect and SecurletsView AnswerAnswer: D

August 10, 2019 No Comments READ MORE +

How does the Audit module get data?

How does the Audit module get data?A . Firewalls and proxiesB . Cloud application APIsC . CloudSOC gatewayD . Manual uploadsView AnswerAnswer: A

August 10, 2019 No Comments READ MORE +

Which detector will trigger if a user attempts a series of invalid logins within a specific time period?

Which detector will trigger if a user attempts a series of invalid logins within a specific time period?A . Threats basedB . Sequence basedC . Threshold basedD . Behavior basedView AnswerAnswer: C

August 10, 2019 No Comments READ MORE +

What policy should an administrator utilize to allow users access to Office 365, but prevent the extraction of files when their ThreatScore is higher than 30?

What policy should an administrator utilize to allow users access to Office 365, but prevent the extraction of files when their ThreatScore is higher than 30?A . File transferB . Access enforcementC . ThreatScore basedD . Data exposureView AnswerAnswer: C Explanation: Reference: https://support.symantec.com/en_US/article.ALERT2395.html

August 3, 2019 No Comments READ MORE +