Showing all 4 resultsSorted by latest
Username or email address *
Password *
Log in
Lost your password? Remember me
No account yet?
250-443
Practice makes perfect! Take this quiz now to test your knowledge and boost your confidence for the real exam.
1 / 10
The Audit tool in the CloudSOC UI is able to present security verdicts of cloud applications over a variety of form factors. Which? Response:
2 / 10
According to the 2018 Shadow Data Report by Symantec, where does the greatest risk of data overexposure originate? Response:
3 / 10
Data about cloud applications which drives the BRR is shared by CloudSOC with the Symantec Global Intelligence Network (GIN). This information can be utilized to create policies which additional Symantec product? Response:
4 / 10
When cloud application adoption bypasses formal processes, what are some of the potentially negative outcomes? (Select two) Response: E. The user cannot chose whether to leverage corporate or personal credentials to create the account, thus reducing productivity
5 / 10
You have a user in your organization with whom you wish to share a specific report, but to whom you do not wish to grant portal access. Where in the CloudSOC UI can you configure a scheduled report to be sent to them? Response:
6 / 10
When creating user profiles for administration of CloudSOC, which areas of control can you enable or restrict? Response: Domain Control
7 / 10
Users and groups are required for CloudSOC to know which data and accounts to scan. How can this information be populated in CloudSOC? Response: Collection
8 / 10
The CloudSOC Audit Tool rates BRR. What does this abbreviation mean? Response:
9 / 10
According to the 2018 Shadow Data Report by Symantec, of all broadly shared files, which category of sensitive data is most likely to be over exposed? Response:
10 / 10
CloudSOC users may be allocated one or more ‘roles’. Select the correct Response:
Your score is
Restart quiz