🎖️🏵️ Memorial Weekend Sale — 30% off🏵️🎖️

15 hours, 8 minutes remaining!
CompTIA Study Materials
AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA Cloud+ CV0-003 Practice Question

An organization is deploying a new application in their cloud environment. The security team needs to ensure that only traffic from authorized sources can access this application. Which of the following is the BEST approach to meet this requirement?

  • Implement an allow list for the application based on source IP addresses and domains

  • Use micro-segmentation to isolate the application from other workloads in the cloud

  • Monitor network flows to identify and block unauthorized traffic towards the application

  • Place the application on a blocklist that specifies disallowed source IP addresses and domains

This question is for objective:
Security
Your Score:
Security
Deployment
Operations and Support
Troubleshooting
Cloud Architecture and Design
SAVE $45