CCSK Exam QuestionsBrowse all questions from this exam

CCSK Exam - Question 55


Which of the following is NOT normally a method for detecting and preventing data migration into the cloud?

Show Answer
Correct Answer: A,B

URL filters are primarily used for controlling and restricting access to websites based on their URLs or web addresses. While they can play a role in enforcing browsing policies and restricting access to specific websites, they are not primarily designed for detecting and preventing data migration into the cloud. Methods like Intrusion Prevention Systems, Data Loss Prevention, Cloud Access and Security Brokers (CASB), and Database Activity Monitoring are more aligned with controlling and monitoring data migration into the cloud.

Discussion

4 comments
Sign in to comment
motenOption: B
Jun 8, 2023

URL filters are typically used for web content filtering and blocking access to specific websites or web resources based on URL criteria. While URL filters can help enforce browsing policies and restrict access to certain websites, they are not primarily designed for detecting and preventing data migration into the cloud.

mootaOption: A
Mar 19, 2023

A is correct. It's not listed in 11.1.3 Managing Data Migrations to the Cloud.

saptati
Jul 23, 2023

I agree, A is the correct answer. Ref: Security-Guidance-v4.0, Pg121.

BrainiacOption: B
May 25, 2023

The method for detecting and preventing data migration into the cloud that is NOT normally used is: B. URL filters URL filters are primarily used for controlling and restricting access to websites based on their URLs or web addresses. They are commonly employed in web filtering and content control scenarios. However, URL filters are not typically used as a method specifically for detecting and preventing data migration into the cloud.

a2m2
Oct 18, 2023

Hola. De cierto modo si ya que mediante un filtrado de URL puede detectar la ruta, servicio en nube que esta usando para hacer la transferencia de datos y de cierto modo llegar a bloquear o permitirlo según sean las políticas de la empresa.

_jpsrob_Option: A
Mar 26, 2024

A. Intrusion Prevention System Intrusion Prevention Systems (IPS) are primarily used for identifying and preventing malicious activities and attacks on a network or system, not specifically toward detecting and preventing data migration into the cloud. Methods like URL filters, Data Loss Prevention (DLP), Cloud Access Security Brokers (CASB), and Database Activity Monitoring are more aligned with controlling and monitoring data migration into the cloud, as they focus on data protection, detect data breaches, control access to cloud services, and monitor database activities. reference page 121 for more information