A large company with a very complex IT environment is considering a move from an on-premises, internally managed proxy to a cloud-based proxy solution managed by an external vendor. The current proxy provides caching, content filtering, malware analysis, and URL categorization for all staff connected behind the proxy. Staff members connect directly to the Internet outside of the corporate network. The cloud-based version of the solution would provide content filtering, TLS decryption, malware analysis, and URL categorization. After migrating to the cloud solution, all internal proxies would be decommissioned. Which of the following would MOST likely change the company's risk profile?
A) 1. There would be a loss of internal intellectual knowledge regarding proxy configurations and application data flows. 2. There would be a greater likelihood of Internet access outages due to lower resilience of cloud gateways. 3. There would be data sovereignty concerns due to changes required in routing and proxy PAC files.
B) 1. The external vendor would have access to inbound and outbound gateway traffic. 2. The service would provide some level of protection for staff working from home. 3. Outages would be likely to occur for systems or applications with hard-coded proxy information.
C) 1. The loss of local caching would dramatically increase ISP changes and impact existing bandwidth. 3. There would be a loss of internal intellectual knowledge regarding proxy configurations and application data flows.
D) 1. Outages would be likely to occur for systems or applications with hard-coded proxy information. 2. The service would provide some level of protection for staff members working from home. 3. Malware detection times would decrease due to third-party management of the service.
Correct Answer:
Verified
Q421: When implementing a penetration testing program, the
Q422: A security manager needed to protect a
Q423: A company is migrating systems from an
Q424: After investigating virus outbreaks that have cost
Q425: A penetration test is being scoped for
Q427: Ann, a member of the finance department
Q428: An analyst is investigating behavior on a
Q429: A security administrator adding a NAC requirement
Q430: A security analyst is inspecting pseudocode of
Q431: To meet a SLA, which of the
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents