A network technician has implemented ACLs to limit access to cloud-based file storage.
Which of the following security mechanisms has the technician enforced?
A.
DLP B.
IDS C.
WAF D.
WPA E.
TPM.
C.
A network technician has implemented ACLs to limit access to cloud-based file storage.
Which of the following security mechanisms has the technician enforced?
A.
DLP
B.
IDS
C.
WAF
D.
WPA
E.
TPM.
C.
The security mechanism that the network technician has enforced by implementing ACLs to limit access to cloud-based file storage is a Web Application Firewall (WAF).
A WAF is a type of firewall that protects web applications by monitoring, filtering, and blocking HTTP traffic to and from a web application. It filters out malicious traffic, such as SQL injection attacks, cross-site scripting (XSS) attacks, and other types of web attacks.
In this scenario, the network technician has implemented ACLs (Access Control Lists) to limit access to cloud-based file storage, which means that the technician has created a set of rules that control access to the storage. This is similar to a WAF, which also creates a set of rules to control access to web applications.
Therefore, the correct answer is C, WAF. DLP (Data Loss Prevention) is a security mechanism used to prevent unauthorized data disclosure. IDS (Intrusion Detection System) is a security mechanism used to detect and prevent unauthorized access to a network. WPA (Wi-Fi Protected Access) is a security mechanism used to secure wireless networks. TPM (Trusted Platform Module) is a security mechanism used to store cryptographic keys and other security data.