This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
How is shadow IT introduced into an organization?
When a large number of users exhibit strange usage patterns across their daily apps.
When a cybercriminal successfully proliferates their attack and gains control of apps or devices.
When users in an organization use nonsanctioned apps that might not be compliant
Your organization wants to continuously monitor and respond to suspicious user actions in apps based on risk indicators like sign-in failures and activities from inactive accounts. How should it do this?
Use malware protection.
Use automated investigation and remediation.
Apply user and entity behavioral analytics.
Your organization wants to be able to scan for proprietary information when documents are being sent through cloud applications. How will it do this?
Use anomaly detection.
Use file policies.
You must answer all questions before checking your work.
Was this page helpful?