A company wants to enforce security policies for users accessing third-party cloud applications. A solution is needed that can analyze requests in real time without installing any software on endpoints. Which method meets these needs?
A device-level technique that modifies the local operating environment for scanning
An approach that hinges on local client software to watch activity
A name resolution strategy that diverts traffic during domain lookups
A network-based system that enforces inspection of sessions between users and the cloud
A network-based system that inspects sessions between users and cloud services provides direct oversight of data transfers. It does not require changing local environments or relying on name resolution alone. Other options either involve device-level agents or name service modifications, which do not offer the same level of real-time session control and continuous inspection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a network-based system for inspecting user sessions?
Open an interactive chat with Bash
What is a Cloud Access Security Broker (CASB), and how does it relate to network-based solutions?
Open an interactive chat with Bash
How does real-time session inspection differ from device-level or name resolution methods?