CompTIA Cloud+ CV0-003 Practice Question
An organization is deploying a new application in their cloud environment. The security team needs to ensure that only traffic from authorized sources can access this application. Which of the following is the BEST approach to meet this requirement?
Monitor network flows to identify and block unauthorized traffic towards the application
Use micro-segmentation to isolate the application from other workloads in the cloud
Place the application on a blocklist that specifies disallowed source IP addresses and domains
Implement an allow list for the application based on source IP addresses and domains