A company needs to comply with GDPR regulations. What should they prioritize?
AData storage in local servers
BRegular data backups
CUser consent for data processing
DImplementing firewall rules
Explanation
GDPR emphasizes acquiring user consent for data processing; the others do not directly address compliance requirements.
Q192
You are configuring a policy to monitor data transfers. What happens when you set a threshold of 100MB?
AAll transfers above 100MB are blocked
BAlerts are sent for transfers exceeding 100MB
COnly internal transfers are monitored
DNo monitoring occurs above 100MB
Explanation
Setting a threshold of 100MB typically triggers alerts for excessive data transfers; blocking isn't default behavior, and other options are incorrect.
Q193
Which service in Symantec CloudSOC enhances security by identifying sensitive data?
AData Loss Prevention
BThreat Protection
CCloud Access Security Broker
DIdentity and Access Management
Explanation
Data Loss Prevention helps identify sensitive data, whereas the other options serve different functions.
Q194
A company needs to monitor user activity across multiple cloud services. What should they configure in Symantec CloudSOC?
AUser and Entity Behavioral Analytics
BCloud Security Posture Management
CIntrusion Detection System
DEndpoint Protection
Explanation
User and Entity Behavioral Analytics is designed for activity monitoring, unlike the other options.
Q195
You are configuring policies in CloudSOC. What happens when you set a strict threshold for alerts?
AAll actions are automatically blocked
BFewer alerts may be triggered
COnly critical alerts are sent
DUser access is never restricted
Explanation
Setting stricter thresholds can reduce the number of alerts, while the other options do not accurately describe this outcome.
Q196
Which service is primarily used to monitor data security in cloud applications?
ACloudSOC
BData Loss Prevention
CEndpoint Protection
DVirtual Machine Management
Explanation
CloudSOC provides comprehensive monitoring for data security in cloud applications, unlike the others which serve different purposes.
Q197
A company needs to upload sensitive data to a cloud storage solution while ensuring encryption. What should they do?
AUse multi-factor authentication
BEnable data-at-rest encryption
CSplit data into smaller files
DUse a public cloud without changes
Explanation
Enabling data-at-rest encryption ensures sensitive data is protected when stored, unlike other options that do not directly safeguard the data.
Q198
You are configuring a deployment for a cloud application with strict compliance requirements. What happens when you ignore logging features?
ANo impact on functionality
BRisk of non-compliance increases
CPerformance may degrade
DStorage costs will rise
Explanation
Ignoring logging can lead to non-compliance with regulations, while the other options do not directly pertain to compliance aspects.
Q199
Which service allows real-time data protection in Symantec CloudSOC?
ACloudSOC Incident Response
BCloudSOC Compliance Manager
CCloudSOC Data Loss Prevention
DCloudSOC User Behavior Analytics
Explanation
CloudSOC Data Loss Prevention focuses on protecting sensitive data, while others serve different purposes like compliance or user behaviors.
Q200
A company needs to prevent sensitive data sharing in cloud applications. What should they enable?
AData Discovery
BAPI Security
CDLP Policies
DUser Training
Explanation
DLP Policies enforce regulations for data sharing, while others are supportive measures but not directly controlling data sharing.