Knowledge check

Completed
1.

How is shadow IT introduced into an organization?

2.

Your organization wants to continuously monitor and respond to suspicious user actions in apps based on risk indicators like sign-in failures and activities from inactive accounts. How should it do this?

3.

Your organization wants to be able to scan for proprietary information when documents are being sent through cloud applications. How will it do this?