Which module(s) use the CloudSOC gateway as a data source?
Refer to the exhibit. Which module(s) use the CloudSOC gateway as a data source?A . AuditB . Detect and ProtectC . Detect, Protect, and InvestigateD . Detect, Protect, Investigate, and SecurletsView AnswerAnswer: B
Which type of a policy can perform a user log out from Single Sign On?
Which type of a policy can perform a user log out from Single Sign On?A . Access Monitoring policyB . ThreatScore based policyC . Access enforcement policyD . None of the aboveView AnswerAnswer: D
What is the objective of File Sharing policies?
What is the objective of File Sharing policies?A . To restrict the direct sharing of documents from cloud applications based both on their content and the characteristics of the user.B . To prevent users from sharing documents, either publicly, externally, or internally.C . To notify an administrator when activities, such...
What type of policy should an administrator utilize to prevent the spread of malware through cloud applications?
What type of policy should an administrator utilize to prevent the spread of malware through cloud applications?A . Access monitoringB . File transferC . File sharingD . Access enforcementView AnswerAnswer: A
Which detector will trigger if CloudSOC detects anomalously frequent sharing?
Which detector will trigger if CloudSOC detects anomalously frequent sharing?A . Behavior basedB . Threshold basedC . Sequence basedD . Threats basedView AnswerAnswer: D
What CloudSOC module should an administrator use to identify and remediate malicious behavior within cloud applications?
What CloudSOC module should an administrator use to identify and remediate malicious behavior within cloud applications?A . AuditB . SecurletsC . DetectD . InvestigateView AnswerAnswer: C
What modules are used in the use case “Identify and remediate malicious behavior within cloud applications”?
What modules are used in the use case “Identify and remediate malicious behavior within cloud applications”?A . Detect, Protect, and InvestigateB . Detect and InvestigateC . DetectD . Detect and SecurletsView AnswerAnswer: D
How does the Audit module get data?
How does the Audit module get data?A . Firewalls and proxiesB . Cloud application APIsC . CloudSOC gatewayD . Manual uploadsView AnswerAnswer: A
Which detector will trigger if a user attempts a series of invalid logins within a specific time period?
Which detector will trigger if a user attempts a series of invalid logins within a specific time period?A . Threats basedB . Sequence basedC . Threshold basedD . Behavior basedView AnswerAnswer: C
What policy should an administrator utilize to allow users access to Office 365, but prevent the extraction of files when their ThreatScore is higher than 30?
What policy should an administrator utilize to allow users access to Office 365, but prevent the extraction of files when their ThreatScore is higher than 30?A . File transferB . Access enforcementC . ThreatScore basedD . Data exposureView AnswerAnswer: C Explanation: Reference: https://support.symantec.com/en_US/article.ALERT2395.html