正解:A
Comprehensive and Detailed Step-by-Step Explanation:
ACloud Access Security Broker (CASB)ensuresvisibility, compliance, and securityof cloud applications, andmonitoring data movementis the key to detecting threats.
* Option A (Correct):Monitoring data movementallows organizations todetect and preventunauthorized access, data exfiltration, and cloud-based threats.
* Option B (Incorrect):Along-term contractdoes not inherentlyimprove security monitoring.
* Option C (Incorrect):Reviewing policies helps withgovernance, but it does notactively detect threats.
* Option D (Incorrect):Firewallsprotectnetwork perimeters, while CASBs focus oncloud security, making this anineffective measurefor CASB threat detection.
Reference:ISACA CISA Review Manual -Domain 5: Protection of Information Assets- CoversCASB, cloud security, and threat detection best practices.