
Answer-first summary for fast verification
Answer: Implement AWS WAF rules based on the OWASP Top 10 to block common attack vectors.
Implementing AWS WAF rules that are specifically tailored to the OWASP Top 10 recommendations ensures that the application is protected against the most common web application threats. This approach provides a focused and effective security strategy.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
Your company is planning to launch a new application that will be hosted on AWS and will require a robust security posture against common web application threats. Which of the following strategies would best align with the OWASP Top 10 recommendations for securing web applications?
A
Implement AWS WAF rules based on the OWASP Top 10 to block common attack vectors.
B
Use AWS Shield Advanced exclusively to protect against DDoS attacks.
C
Deploy the application across multiple Availability Zones without additional security measures.
D
Rely solely on Amazon CloudFront for content delivery and security.
No comments yet.