How should an administrator handle a cloud application that fails to meet compliance requirements, but the business need outweighs the risk?

How should an administrator handle a cloud application that fails to meet compliance requirements, but the business need outweighs the risk?A . SanctionB . MonitorC . BlockD . ReviewView AnswerAnswer: D

September 27, 2019 No Comments READ MORE +

What module should an administrator use to create policies with one click, and send them to the Protect Module?

What module should an administrator use to create policies with one click, and send them to the Protect Module?A . DetectB . InvestigateC . AuditD . SecurletView AnswerAnswer: D

September 26, 2019 No Comments READ MORE +

What module should an administrator use to create policies that restrict users from sharing data in unsafe ways?

What module should an administrator use to create policies that restrict users from sharing data in unsafe ways?A . SecurletsB . AuditC . ProtectD . DetectView AnswerAnswer: C

September 24, 2019 No Comments READ MORE +

How does the Detect module get data?

How does the Detect module get data?A . Firewalls and proxiesB . CloudSOC gateway and cloud application APIsC . Firewalls and proxies, and CloudSOC gatewayD . Cloud application APIsView AnswerAnswer: C

September 18, 2019 No Comments READ MORE +

What data source types does Audit support?

What data source types does Audit support?A . SSH, FTP, Remote desktopB . Web upload, SFTP, S3C . PDF, DOC, XLSD . APIsView AnswerAnswer: C

September 16, 2019 No Comments READ MORE +

Which CloudSOC module(s) use firewalls and proxies as data sources?

Refer to the exhibit. Which CloudSOC module(s) use firewalls and proxies as data sources?A . Detect, Protect, and InvestigateB . Detect, Protect, Investigate, and SecurletsC . Audit and InvestigateD . AuditView AnswerAnswer: C Explanation: Reference: https://www.niwis.com/downloads/Symantec/Symantec_CloudSOC.pdf

September 15, 2019 No Comments READ MORE +

What type of policy should an administrator create to get email notifications if the incident happens again?

Refer to the exhibit. An administrator found this incident in the Investigate module. What type of policy should an administrator create to get email notifications if the incident happens again?A . File sharing policyB . File transfer policyC . Access monitoring policyD . Data exposure policyView AnswerAnswer: B

September 13, 2019 No Comments READ MORE +

What module should an administrator use to identify anomalous user behavior such as large amounts of data being downloaded, too many files being shared, or logins from suspicious locations?

What module should an administrator use to identify anomalous user behavior such as large amounts of data being downloaded, too many files being shared, or logins from suspicious locations?A . DetectB . ProtectC . InvestigateD . AuditView AnswerAnswer: A Explanation: Reference: http://www.arrowecs.pt/ficheros/ partners/211_ShadowDataReport_1H_2016_Digital_Screen_compressed.pdf

September 10, 2019 No Comments READ MORE +

What Business Readiness Rating (BRR) category does the subcategory “Password Quality Rules” belong to?

What Business Readiness Rating (BRR) category does the subcategory “Password Quality Rules” belong to?A . DataB . ComplianceC . BusinessD . AccessView AnswerAnswer: D

September 4, 2019 No Comments READ MORE +

What modules are used in the use case “Protect information from accidental and intentional exposure within cloud applications”?

Refer to the exhibit. What modules are used in the use case “Protect information from accidental and intentional exposure within cloud applications”?A . Protect and InvestigateB . Protect, Investigate, and SecurletsC . Protect and AuditD . Protect and SecurletsView AnswerAnswer: A

September 2, 2019 No Comments READ MORE +