9.5.6
Which type of firewall operates at Layer 7 of the OSI model?
Application layer
What is the on-premises, cloud-based software tool that sits between an organization and a cloud service provider called?
Cloud-access security broker
Which of the following can provide the most specific protection and monitoring capabilities?
Cloud-access security broker
Which of the following is a network device that is deployed in the cloud to protect against unwanted access to a private network?
Cloud-based firewall
Which of the following tools allows the user to set security rules for an instance of an application that interacts with one organization and different security rules for an instance of the application when interacting with another organization?
Instance awareness
What is the system that connects application repositories, systems, and IT environments in a way that allows access and exchange of data over a network by multiple devices and locations called?
Integration
Which type of firewall protects against packets coming from certain IP addresses?
Packet-filtering
Which of the following methods can cloud providers implement to provide high availability?
Replication
Which of the following is a network security service that filters malware from user-side internet connections using different techniques?
Secure web gateway
Which formula is used to determine a cloud provider's availability percentage?
Uptime/uptime + downtime