Which CloudSOC module is similar to a Data Loss Prevention (DLP) system?
Which CloudSOC module is similar to a Data Loss Prevention (DLP) system?A . DetectB . InvestigateC . AuditD . ProtectView AnswerAnswer: A
What module can an administrator use to connect certain cloud applications to CloudSOC via APIs, and have complete visibility into the content being shared in those cloud applications?
What module can an administrator use to connect certain cloud applications to CloudSOC via APIs, and have complete visibility into the content being shared in those cloud applications?A . InvestigateB . DetectC . ProtectD . SecurletsView AnswerAnswer: D
What modules are used by the use case “Identify and determine business risk of cloud applications being used within the organization”?
Refer to the exhibit. What modules are used by the use case “Identify and determine business risk of cloud applications being used within the organization”?A . InvestigateB . Audit and InvestigateC . AuditD . Audit and SecurletsView AnswerAnswer: B
What compensatory control should an administrator implement if password quality rules of a cloud application has a low rating?
What compensatory control should an administrator implement if password quality rules of a cloud application has a low rating?A . Single Sign On (SSO)B . Block the applicationC . Role based accessD . Biometric accessView AnswerAnswer: A Explanation: Reference: https://www.symantec.com/content/dam/symantec/docs/solution-briefs/shadow-it-discoverybest-practices-guide-en.pdf
What module should an administrator use to view all activities in cloud applications?
What module should an administrator use to view all activities in cloud applications?A . ProtectB . AuditC . DetectD . InvestigateView AnswerAnswer: A
Which modules are used in the use case “Determine optimal cloud application adoption based on business risk and cost of ownership”?
Refer to the exhibit. Which modules are used in the use case “Determine optimal cloud application adoption based on business risk and cost of ownership”?A . Audit and ProtectB . AuditC . Detect, Protect, and InvestigateD . Protect, Investigate, and SecurletsView AnswerAnswer: B
What type of policy should an administrator use to prevent a user that is behaving in anomalous ways from sharing public links while you monitor them?
What type of policy should an administrator use to prevent a user that is behaving in anomalous ways from sharing public links while you monitor them?A . Access monitoringB . File transferC . Data exposureD . Access enforcementView AnswerAnswer: D
What type of solution should an administrator implement to secure the way users interact with cloud applications?
What type of solution should an administrator implement to secure the way users interact with cloud applications?A . Intrusion Detection System/Intrusion Protection System (IDS/IPS)B . Cloud Access Security Broker (CASB)C . Web application firewallsD . ProxiesView AnswerAnswer: B
Which are three (3) levels of data exposure?
Which are three (3) levels of data exposure?A . Public, external, and internalB . Public, confidential, and company confidentialC . Public, semi-private, and privateD . Public, confidential, and privateView AnswerAnswer: A
How does the Securlet module get data?
How does the Securlet module get data?A . Firewall and proxiesB . CloudSOC gatewayC . Cloud application APIsD . CloudSOC gateway and cloud application APIsView AnswerAnswer: D