In deploying a Cloud Access Security Broker (CASB) solution using a reverse proxy, how is the CASB configured?

Get more with Examzify Plus

Remove ads, unlock favorites, save progress, and access premium tools across devices.

FavoritesSave progressAd-free
From $9.99Learn more

Prepare for the WGU ITAS6291 D488 Cybersecurity Architecture and Engineering exam. Use flashcards and multiple-choice questions, each with explanations and guidance. Master your knowledge and excel in your exam!

The correct choice is the one that describes the function of a CASB when deployed as a reverse proxy. In this configuration, the CASB acts as an intermediary that sits between users and cloud services. By being positioned at the cloud network edge, it effectively inspects and secures the traffic directed to cloud services.

This arrangement allows the CASB to enforce security policies, monitor user activity, and ensure compliance with regulatory requirements while still providing users seamless access to cloud applications. Using a reverse proxy setup, all user traffic is routed through the CASB, giving it the capability to perform functions such as data loss prevention, threat detection, and access control.

Other options describe different configurations or functionalities of CASBs or similar systems but do not accurately capture the reverse proxy setup. For instance, describing a CASB merely as an appliance at the client edge does not encompass the security and monitoring capabilities that a reverse proxy configuration provides. Similarly, configurations that focus on systems with settings or agents do not align with the role of a reverse proxy, which processes and monitors traffic, rather than just configuring endpoints or installing individual software. The API-based connection option pertains more to API configuration than the reverse proxy setup, which is specifically for traffic management related to cloud services.

Thus

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy