ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 33 - CV0-004 discussion

Report
Export

A cross-site request forgery vulnerability exploited a web application that was hosted in a public laaS network. A security engineer determined that deploying a WAF in blocking mode at a CDN would prevent the application from being exploited again. However, a week after implementing the WAF, the application was exploited again. Which of the following should the security engineer do to make the WAF control effective?

A.
Configure the DDoS protection on the CDN.
Answers
A.
Configure the DDoS protection on the CDN.
B.
Install endpoint protection software on the VMs
Answers
B.
Install endpoint protection software on the VMs
C.
Add an ACL to the VM subnet.
Answers
C.
Add an ACL to the VM subnet.
D.
Deploy an IDS on the laaS network.
Answers
D.
Deploy an IDS on the laaS network.
Suggested answer: C

Explanation:

After a WAF deployment fails to prevent an exploit, adding an Access Control List (ACL) to the Virtual Machine (VM) subnet can be an effective control. ACLs provide an additional layer of security by explicitly defining which traffic can or cannot enter a network segment. By setting granular rules based on IP addresses, protocols, and ports, ACLs help to restrict access to resources, thereby mitigating potential exploits and enhancing the security of the IaaS network.

Reference: CompTIA Cloud+ materials cover governance, risk, compliance, and security for the cloud, including the implementation of network security controls like ACLs, to protect cloud environments from unauthorized access and potential security threats.

asked 02/10/2024
Thomas Kincer
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first