Which CloudSOC module is similar to a Data Loss Prevention (DLP) system?
A. Detect
B. Investigate
C. Audit
D. Protect
What compensatory control should an administrator implement if password quality rules of a cloud application has a low rating?
A. Single Sign On (SSO)
B. Block the application
C. Role based access
D. Biometric access
How does the Detect module get data?
A. Firewalls and proxies
B. CloudSOC gateway and cloud application APIs
C. Firewalls and proxies, and CloudSOC gateway
D. Cloud application APIs
What should an administrator use to identify document types specified by the user?
A. Custom dictionaries
B. Training profiles
C. Risk types
D. Content types
What is the objective of the File Transfer Policy?
A. To restrict the uploading and downloading of documents from the user's computer to the cloud application, based both on the content of the documents, and the characteristics of the user.
B. To restrict user access to cloud applications based on the user's characteristics, such as devices and locations.
C. To prevent users from sharing documents, either publicly, externally, or internally.
D. To notify an administrator when activities such as objects being modified, are performed in a cloud application.
What Business Readiness Rating (BRR) category does the subcategory "HTTP Security Headers" belong to?
A. Informational
B. Service
C. Administrative
D. Data
What policy should an administrator utilize to prevent users from downloading files from Box.com when they are outside the corporate IP range?
A. File transfer
B. File sharing
C. Data exposure
D. Access enforcement
What is the objective of the Data Exposure policy?
A. To notify an administrator when activities, such as objects being modified, are performed in a cloud application.
B. To block users from logging into cloud applications if their ThreatScore is higher than a certain level.
C. To restrict the direct sharing of documents from cloud applications based both on their content and the characteristics of the user.
D. To notify the administrator, file owner or acting user and/or to prevent users from sharing documents, either publicly, externally, or internally.
What policy should an administrator utilize to prevent users from internally sharing files with a group of high risk users?
A. Access Monitoring
B. File transfer
C. Threatscore based
D. Data exposure
Which CloudSOC module(s) use cloud application APIs as data sources?
A. Detect, Protect, Investigate, and Securlets
B. Audit
C. Detect, Protect, and Investigate
D. Investigate and Securlets