Download Symantec.250-437.TestKing.2019-05-31.34q.vcex

Download Exam

File Info

Exam Administration of Symantec CloudSOC
Number 250-437
File Name Symantec.250-437.TestKing.2019-05-31.34q.vcex
Size 549 KB
Posted May 31, 2019
Download Symantec.250-437.TestKing.2019-05-31.34q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

How does the Audit module get data?


  1. Firewalls and proxies
  2. Cloud application APIs
  3. CloudSOC gateway
  4. Manual uploads
Correct answer: A



Question 2

Which detector will trigger if CloudSOC detects anomalously frequent sharing? 


  1. Behavior based
  2. Threshold based
  3. Sequence based
  4. Threats based
Correct answer: D



Question 3

Which are three (3) levels of data exposure?


  1. Public, external, and internal
  2. Public, confidential, and company confidential
  3. Public, semi-private, and private
  4. Public, confidential, and private
Correct answer: A



Question 4

Refer to the exhibit. What modules are used in the use case “Protect information from accidental and intentional exposure within cloud applications”? 
  


  1. Protect and Investigate
  2. Protect, Investigate, and Securlets
  3. Protect and Audit
  4. Protect and Securlets
Correct answer: A



Question 5

What type of policy should an administrator use to prevent a user that is behaving in anomalous ways from sharing public links while you monitor them? 


  1. Access monitoring
  2. File transfer
  3. Data exposure
  4. Access enforcement
Correct answer: D



Question 6

What is the objective of File Sharing policies?


  1. To restrict the direct sharing of documents from cloud applications based both on their content and the characteristics of the user.
  2. To prevent users from sharing documents, either publicly, externally, or internally.
  3. To notify an administrator when activities, such as objects being modified, are performed in a cloud application.
  4. To restrict the uploading and downloading of documents from the user’s computer to the cloud application, based both on the content of the documents, and the 
    characteristics of the user.
Correct answer: A



Question 7

What compensatory control should an administrator implement if password quality rules of a cloud application has a low rating?


  1. Single Sign On (SSO)
  2. Block the application
  3. Role based access
  4. Biometric access
Correct answer: A
Explanation:
Reference: https://www.symantec.com/content/dam/symantec/docs/solution-briefs/shadow-it-discovery-best-practices-guide-en.pdf
Reference: https://www.symantec.com/content/dam/symantec/docs/solution-briefs/shadow-it-discovery-best-practices-guide-en.pdf



Question 8

What CloudSOC module should an administrator use to identify and remediate malicious behavior within cloud applications?


  1. Audit
  2. Securlets
  3. Detect
  4. Investigate
Correct answer: C



Question 9

What modules are used in the use case “Identify and remediate malicious behavior within cloud applications”?


  1. Detect, Protect, and Investigate
  2. Detect and Investigate
  3. Detect
  4. Detect and Securlets
Correct answer: D



Question 10

What type of policy should an administrator utilize to prevent the spread of malware through cloud applications?


  1. Access monitoring 
  2. File transfer
  3. File sharing
  4. Access enforcement
Correct answer: A









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files