ISC2 Certified Cloud Security Professional (CCSP) Practice Question

Your company uses a mix of managed laptops and unmanaged partner devices to access several sanctioned SaaS applications. Management wants to detect sensitive data already stored in the cloud, block the download of confidential files to unmanaged endpoints, and avoid installing new agents or VPNs on user devices. When selecting and deploying a cloud access security broker (CASB), which deployment combination best satisfies these requirements?

  • Rely solely on CASB log collection from SaaS audit APIs and security information and event management (SIEM) correlation.

  • Use a forward-proxy deployment so all traffic from both managed and unmanaged devices is routed through the CASB.

  • Implement only a reverse-proxy CASB to provide real-time controls without additional integrations.

  • Deploy the CASB in API mode for each SaaS service and add reverse-proxy inline enforcement for unmanaged devices.

ISC2 Certified Cloud Security Professional (CCSP)
Cloud Application Security
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot