1.
How does the Audit module get data?
2.
Which detector will trigger if CloudSOC detects anomalously frequent sharing?
3.
Which are three (3) levels of data exposure?
4.
What type of policy should an administrator use to prevent a user that is behaving in anomalous ways from sharing public links while you monitor them?
5.
What is the objective of File Sharing policies?
6.
What compensatory control should an administrator implement if password quality rules of a cloud application has a low rating?
7.
What CloudSOC module should an administrator use to identify and remediate malicious behavior within cloud applications?
8.
What modules are used in the use case Identify and remediate malicious behavior within cloud applications?
9.
What type of policy should an administrator utilize to prevent the spread of malware through cloud applications?
10.
Which type of a policy can perform a user log out from Single Sign On?