A company wants to enforce security policies for users accessing third-party cloud applications. A solution is needed that can analyze requests in real time without installing any software on endpoints. Which method meets these needs?
A network-based system that enforces inspection of sessions between users and the cloud
An approach that hinges on local client software to watch activity
A device-level technique that modifies the local operating environment for scanning
A name resolution strategy that diverts traffic during domain lookups
A network-based system that inspects sessions between users and cloud services provides direct oversight of data transfers. It does not require changing local environments or relying on name resolution alone. Other options either involve device-level agents or name service modifications, which do not offer the same level of real-time session control and continuous inspection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a network-based system enforce inspection of sessions?
Open an interactive chat with Bash
What are the advantages of not requiring endpoint software for this method?
Open an interactive chat with Bash
What is an example of a network-based system used for cloud application security?