Which are three (3) levels of data exposure?
A. Public, external, and internal
B. Public, confidential, and company confidential
C. Public, semi-private, and private
D. Public, confidential, and private
What compensatory control should an administrator implement if password quality rules of a cloud application has a low rating?
A. Single Sign On (SSO)
B. Block the application
C. Role based access
D. Biometric access
Which type of a policy can perform a user log out from Single Sign On?
A. Access Monitoring policy
B. ThreatScore based policy
C. Access enforcement policy
D. None of the above
Refer to the exhibit. What action should an administrator take if this incident was found in the Investigate module?
A. Create an access enforcement policy and block access to the file
B. Create a file transfer policy and block the download of the file
C. Create a file sharing policy and block the sharing of the file
D. Create an access monitoring policy and monitor the usage of the file
What Rule Type in ContentIQ profiles do FERPA, GLBA, HIPAA, PCI AND PII belong to?
A. Regular expressions
B. Content types
C. Risk types
D. Keywords
What type of connection should an administrator use when the network is sensitive to the bandwidth consumed by log traffic transfer to CloudSOC?
A. SCP
B. SpanVA
C. AWS S3 Bucket
D. APIs
How should an administrator handle a cloud application that is business critical, but is NOT the most secure option?
A. Sanction
B. Monitor
C. Block
D. Review
What should an administrator do with a cloud application that does NOT meet the compliance requirements, but has mitigating controls available?
A. Sanction
B. Monitor
C. Block
D. Review
Where should an administrator locate the level of exposure in files in the Securlet module?
A. Exposure level
B. Exposed files
C. Exposed content
D. Exposure summary
What are the four (4) types of detectors?
A. Threshold based, download/upload based, threats based, and sequence based
B. Threshold based, behavior based, and sequence based
C. Threshold based, behavior based, download/upload based, and access control based
D. Threshold based, behavior based, malware based, and sequence based