How does the Audit module get data?
A. Firewalls and proxies
B. Cloud application APIs
C. CloudSOC gateway
D. Manual uploads
Refer to the exhibit. Which modules are used in the use case "Determine optimal cloud application adoption based on business risk and cost of ownership"?
A. Audit and Protect
B. Audit
C. Detect, Protect, and Investigate
D. Protect, Investigate, and Securlets
Which CloudSOC module is similar to a Data Loss Prevention (DLP) system?
A. Detect
B. Investigate
C. Audit
D. Protect
What CloudSOC module should an administrator use to identify and remediate malicious behavior within cloud applications?
A. Audit
B. Securlets
C. Detect
D. Investigate
Refer to the exhibit. What action should an administrator take if this incident was found in the Investigate module?
A. Create an access enforcement policy and block access to the file
B. Create a file transfer policy and block the download of the file
C. Create a file sharing policy and block the sharing of the file
D. Create an access monitoring policy and monitor the usage of the file
Where should an administrator locate unshared content within the Securlet module that contains risky information?
A. Exposed content
B. Activities
C. Other Risks
D. Apps
How should an administrator handle a cloud application that is business critical, but is NOT the most secure option?
A. Sanction
B. Monitor
C. Block
D. Review
What module should an administrator use to compare firewall logs to a database to identify risky cloud applications?
A. Securlets
B. Detect
C. Protect
D. Audit
What type of log upload should an administrator use during production?
A. FTP
B. Web upload
C. SCP/SFTP
D. APIs
What categories should an administrator utilize to classify cloud applications during the cloud applications adoption workflow?
A. Accept, Reject, Block
B. Accept, Monitor, Block
C. Valid, Invalid, In Process
D. Sanction, Monitor, Block