You have applied a DLP Profile to block all Personally Identifiable Information data uploads to Microsoft 365 OneDrive. DLP Alerts are not displayed and no OneDrive-related activities are displayed in the Skope IT App Events table.
In this scenario, what are two possible reasons for this issue? (Choose two.)
The three technologies that describe the primary cloud service models as defined by the National Institute of Standards and Technology (NIST) are Platform as a Service (PaaS), Software as a Service (SaaS), and Infrastructure as a Service (IaaS). These service models are based on the type of computing capability that is provided by the cloud provider to the cloud consumer over a network. According to NIST, these service models have the following definitions:
Platform as a Service (PaaS): The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
Software as a Service (SaaS): The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
Infrastructure as a Service (IaaS): The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).
Elena
3 months agoLazaro
3 months agoDyan
3 months agoNarcisa
4 months agoTheola
4 months agoRebbeca
4 months agoFredric
4 months agoJesusa
4 months agoBernardo
5 months agoAlysa
5 months agoDominga
5 months agoDorothy
5 months agoLaurel
5 months agoCrista
5 months agoAntonio
5 months agoJules
5 months agoTabetha
5 months agoRyan
5 months agoSelma
9 months agoJin
8 months agoLayla
8 months agoArmanda
8 months agoPaulina
8 months agoHannah
10 months agoSharita
9 months agoAlisha
9 months agoLorean
10 months agoDeja
10 months agoJosphine
9 months agoFranchesca
9 months agoFatima
9 months agoShaun
10 months agoTawna
10 months agoAlethea
10 months agoTwana
10 months agoEmeline
11 months agoPeter
9 months agoDexter
9 months agoSharen
10 months agoDenny
10 months agoDaren
10 months agoRenato
10 months agoElden
11 months ago