Sunday, July 26, 2020

Question 4 Explanation

WAF can protect any internet facing endpoint, providing consistent rule enforcement across a customer's applications.
WAF provides you with the ability to create and manage rules for internet threats including
Cross-Site Scripting (XSS), SQL Injection and other OWASP-defined vulnerabilities. Unwanted
bots can be mitigated while tactically allowed desirable bots to enter. Access rules can limit
based on geography or the signature of the request.
As a WAF administrator you can define explicit actions for requests that meet various
conditions. Conditions use various operations and regular expressions. A rule action can be
set to log and allow, detect, or block requests.

0 comments :

Post a Comment

Note: Only a member of this blog may post a comment.