<< Prev Question Next Question >>

Question 19/33

What policy should an administrator utilize to prevent users from downloading files from Box.com when they are outside the corporate IP range?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (33q)
Question 1: Refer to the exhibit. What modules are used by the use case ...
Question 2: What type of log upload should an administrator use during p...
Question 3: Which type of a policy can perform a user log out from Singl...
Question 4: What module should an administrator utilize to view all the ...
Question 5: How does the Securlet module get data?...
Question 6: What type of solution should an administrator implement to s...
Question 7: How should an administrator handle a cloud application that ...
Question 8: Refer to the exhibit. Which module(s) use the CloudSOC gatew...
Question 9: Who causes 80% of data leaks?
Question 10: Refer to the exhibit. An administrator found this incident i...
Question 11: How should an administrator handle a cloud application that ...
Question 12: What categories should an administrator utilize to classify ...
Question 13: What CloudSOC module should an administrator use to prevent ...
Question 14: Which CloudSOC module is similar to a Data Loss Prevention (...
Question 15: What should an administrator utilize to steer traffic from c...
Question 16: Which CloudSOC module is similar to an Intrusion Protection ...
Question 17: What Rule Type in ContentIQ profiles do FERPA, GLBA, HIPAA, ...
Question 18: What Rule Type in ContentIQ do movies, presentations, raster...
Question 19: What policy should an administrator utilize to prevent users...
Question 20: Refer to the exhibit. Which module(s) are utilized in the us...
Question 21: Refer to the exhibit. Which CloudSOC module(s) use firewalls...
Question 22: What module should an administrator use to create policies w...
Question 23: What are three (3) main risks that CloudSOC solves in cloud ...
Question 24: What should an administrator do with a cloud application tha...
Question 25: What are the four (4) types of detectors?...
Question 26: What module can an administrator use to connect certain clou...
Question 27: Refer to the exhibit. What action should an administrator ta...
Question 28: What type of connection should an administrator use when the...
Question 29: Which action should an administrator take if a cloud applica...
Question 30: What is the objective of the Access Enforcement policy?...
Question 31: Refer to the exhibit. An administrator found several inciden...
Question 32: Where should an administrator locate unshared content within...
Question 33: What is one of the security challenges generated by the prol...