Exam CCSK All QuestionsBrowse all questions from this exam
Question 55

Which of the following is NOT normally a method for detecting and preventing data migration into the cloud?

    Correct Answer: B

    URL filters are primarily used for controlling and restricting access to websites based on their URLs or web addresses. While they can play a role in enforcing browsing policies and restricting access to specific websites, they are not primarily designed for detecting and preventing data migration into the cloud. Methods like Intrusion Prevention Systems, Data Loss Prevention, Cloud Access and Security Brokers (CASB), and Database Activity Monitoring are more aligned with controlling and monitoring data migration into the cloud.

Discussion
motenOption: B

URL filters are typically used for web content filtering and blocking access to specific websites or web resources based on URL criteria. While URL filters can help enforce browsing policies and restrict access to certain websites, they are not primarily designed for detecting and preventing data migration into the cloud.

BrainiacOption: B

The method for detecting and preventing data migration into the cloud that is NOT normally used is: B. URL filters URL filters are primarily used for controlling and restricting access to websites based on their URLs or web addresses. They are commonly employed in web filtering and content control scenarios. However, URL filters are not typically used as a method specifically for detecting and preventing data migration into the cloud.

a2m2

Hola. De cierto modo si ya que mediante un filtrado de URL puede detectar la ruta, servicio en nube que esta usando para hacer la transferencia de datos y de cierto modo llegar a bloquear o permitirlo según sean las políticas de la empresa.

mootaOption: A

A is correct. It's not listed in 11.1.3 Managing Data Migrations to the Cloud.

saptati

I agree, A is the correct answer. Ref: Security-Guidance-v4.0, Pg121.

_jpsrob_Option: A

A. Intrusion Prevention System Intrusion Prevention Systems (IPS) are primarily used for identifying and preventing malicious activities and attacks on a network or system, not specifically toward detecting and preventing data migration into the cloud. Methods like URL filters, Data Loss Prevention (DLP), Cloud Access Security Brokers (CASB), and Database Activity Monitoring are more aligned with controlling and monitoring data migration into the cloud, as they focus on data protection, detect data breaches, control access to cloud services, and monitor database activities. reference page 121 for more information