How does the Audit module get data?
A. Firewalls and proxies
B. Cloud application APIs
C. CloudSOC gateway
D. Manual uploads
How should an administrator handle a cloud application that fails to meet compliance requirements, but the business need outweighs the risk?
A. Sanction
B. Monitor
C. Block
D. Review
What module requires administrative rights to make connections to cloud applications?
A. Securlets
B. Gatelets
C. Audit
D. Investigate
What Rule Type in ContentIQ profiles do FERPA, GLBA, HIPAA, PCI AND PII belong to?
A. Regular expressions
B. Content types
C. Risk types
D. Keywords
What type of connection should an administrator use when the network is sensitive to the bandwidth consumed by log traffic transfer to CloudSOC?
A. SCP
B. SpanVA
C. AWS S3 Bucket
D. APIs
What Rule Type in ContentIQ profiles do business, computing, encryption, engineering, health, and legal belong to?
A. Content types
B. Custom dictionaries
C. Keywords
D. Risk types
What should an administrator utilize to steer traffic from client devices to the CloudSOC gateway?
A. SpanVA
B. ProxySG
C. The Reach agent
D. SCP/SFTP
What module should an administrator use to compare firewall logs to a database to identify risky cloud applications?
A. Securlets
B. Detect
C. Protect
D. Audit
Which action should an administrator take if a cloud application fails to meet security and compliance requirements, but the business need outweighs the risks?
A. Sanction
B. Monitor
C. Block
D. Substitute
An administrator discovers that an employee has been sending confidential documents to a competitor.
What type of policy should the administrator use to block the transmission of files to that domain?
A. Access monitoring
B. Data Exposure
C. File transfer
D. Access enforcement