How should an administrator handle a cloud application that fails to meet compliance requirements, but the business need outweighs the risk?
How should an administrator handle a cloud application that fails to meet compliance requirements, but the business need outweighs the risk?A . SanctionB . MonitorC . BlockD . ReviewView AnswerAnswer: D
What module should an administrator use to create policies with one click, and send them to the Protect Module?
What module should an administrator use to create policies with one click, and send them to the Protect Module?A . DetectB . InvestigateC . AuditD . SecurletView AnswerAnswer: D
What module should an administrator use to create policies that restrict users from sharing data in unsafe ways?
What module should an administrator use to create policies that restrict users from sharing data in unsafe ways?A . SecurletsB . AuditC . ProtectD . DetectView AnswerAnswer: C
How does the Detect module get data?
How does the Detect module get data?A . Firewalls and proxiesB . CloudSOC gateway and cloud application APIsC . Firewalls and proxies, and CloudSOC gatewayD . Cloud application APIsView AnswerAnswer: C
What data source types does Audit support?
What data source types does Audit support?A . SSH, FTP, Remote desktopB . Web upload, SFTP, S3C . PDF, DOC, XLSD . APIsView AnswerAnswer: C
Which CloudSOC module(s) use firewalls and proxies as data sources?
Refer to the exhibit. Which CloudSOC module(s) use firewalls and proxies as data sources?A . Detect, Protect, and InvestigateB . Detect, Protect, Investigate, and SecurletsC . Audit and InvestigateD . AuditView AnswerAnswer: C Explanation: Reference: https://www.niwis.com/downloads/Symantec/Symantec_CloudSOC.pdf
What type of policy should an administrator create to get email notifications if the incident happens again?
Refer to the exhibit. An administrator found this incident in the Investigate module. What type of policy should an administrator create to get email notifications if the incident happens again?A . File sharing policyB . File transfer policyC . Access monitoring policyD . Data exposure policyView AnswerAnswer: B
What module should an administrator use to identify anomalous user behavior such as large amounts of data being downloaded, too many files being shared, or logins from suspicious locations?
What module should an administrator use to identify anomalous user behavior such as large amounts of data being downloaded, too many files being shared, or logins from suspicious locations?A . DetectB . ProtectC . InvestigateD . AuditView AnswerAnswer: A Explanation: Reference: http://www.arrowecs.pt/ficheros/ partners/211_ShadowDataReport_1H_2016_Digital_Screen_compressed.pdf
What Business Readiness Rating (BRR) category does the subcategory “Password Quality Rules” belong to?
What Business Readiness Rating (BRR) category does the subcategory “Password Quality Rules” belong to?A . DataB . ComplianceC . BusinessD . AccessView AnswerAnswer: D
What modules are used in the use case “Protect information from accidental and intentional exposure within cloud applications”?
Refer to the exhibit. What modules are used in the use case “Protect information from accidental and intentional exposure within cloud applications”?A . Protect and InvestigateB . Protect, Investigate, and SecurletsC . Protect and AuditD . Protect and SecurletsView AnswerAnswer: A