What should an administrator do with a cloud application that does NOT meet the compliance requirements, but has mitigating controls available?
A. Sanction
B. Monitor
C. Block
D. Review
What categories should an administrator utilize to classify cloud applications during the cloud applications adoption workflow?
A. Accept, Reject, Block
B. Accept, Monitor, Block
C. Valid, Invalid, In Process
D. Sanction, Monitor, Block
What policy should an administrator utilize to prevent users from internally sharing files with a group of high risk users?
A. Access Monitoring
B. File transfer
C. Threatscore based
D. Data exposure
Which CloudSOC module should an administrator utilize to identify and understand how cloud applications use information?
A. Audit
B. Detect
C. Securlets
D. Protect
What is the objective of the Data Exposure policy?
A. To notify an administrator when activities, such as objects being modified, are performed in a cloud application.
B. To block users from logging into cloud applications if their ThreatScore is higher than a certain level.
C. To restrict the direct sharing of documents from cloud applications based both on their content and the characteristics of the user.
D. To notify the administrator, file owner or acting user and/or to prevent users from sharing documents, either publicly, externally, or internally.
An administrator discovers that an employee has been sending confidential documents to a competitor.
What type of policy should the administrator use to block the transmission of files to that domain?
A. Access monitoring
B. Data Exposure
C. File transfer
D. Access enforcement
Which action should an administrator take if a cloud application fails to meet security and compliance requirements, but the business need outweighs the risks?
A. Sanction
B. Monitor
C. Block
D. Substitute
What policy should an administrator utilize to prevent users from downloading files from Box.com when they are outside the corporate IP range?
A. File transfer
B. File sharing
C. Data exposure
D. Access enforcement
What type of log upload should an administrator use during production?
A. FTP
B. Web upload
C. SCP/SFTP
D. APIs
What should an administrator utilize to steer traffic from client devices to the CloudSOC gateway?
A. SpanVA
B. ProxySG
C. The Reach agent
D. SCP/SFTP
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-437 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.