How should an administrator handle a cloud application that fails to meet compliance requirements, but the business need outweighs the risk?
A. Sanction
B. Monitor
C. Block
D. Review
What is the objective of File Sharing policies?
A. To restrict the direct sharing of documents from cloud applications based both on their content and the characteristics of the user.
B. To prevent users from sharing documents, either publicly, externally, or internally.
C. To notify an administrator when activities, such as objects being modified, are performed in a cloud application.
D. To restrict the uploading and downloading of documents from the user's computer to the cloud application, based both on the content of the documents, and the characteristics of the user.
What data source types does Audit support?
A. SSH, FTP, Remote desktop
B. Web upload, SFTP, S3
C. PDF, DOC, XLS
D. APIs
What module requires administrative rights to make connections to cloud applications?
A. Securlets
B. Gatelets
C. Audit
D. Investigate
What step should an administrator complete immediately before being able to classify a cloud application using the cloud application adoption workflow?
A. Discover Shadow IT
B. Ensure compliance
C. Analyze usage
D. Identify risky apps
Refer to the exhibit. Which module(s) are utilized in the use case "Identify and understand how information is used within cloud applications"?
A. Investigate
B. Securlets
C. Protect, Investigate, and Securlets
D. Detect, Protect, and Investigate
Refer to the exhibit. An administrator found several incidents like this in the Investigate module.
What type of detector should an administrator modify to reduce the frequency of this type of incident?
A. Threshold based
B. Threats based
C. Sequence based
D. Behavior based
What categories should an administrator utilize to classify cloud applications during the cloud applications adoption workflow?
A. Accept, Reject, Block
B. Accept, Monitor, Block
C. Valid, Invalid, In Process
D. Sanction, Monitor, Block
Where should an administrator locate the level of exposure in files in the Securlet module?
A. Exposure level
B. Exposed files
C. Exposed content
D. Exposure summary
What are the four (4) types of detectors?
A. Threshold based, download/upload based, threats based, and sequence based
B. Threshold based, behavior based, and sequence based
C. Threshold based, behavior based, download/upload based, and access control based
D. Threshold based, behavior based, malware based, and sequence based