1.
How does the Audit module get data?
2.
Which detector will trigger if CloudSOC detects anomalously frequent sharing?
3.
Which are three (3) levels of data exposure?
4.
What type of policy should an administrator use to prevent a user that is behaving in anomalous ways from sharing public links while you monitor them?
5.
What is the objective of File Sharing policies?