✅ Перевірена відповідь на це питання доступна нижче. Наші рішення, перевірені спільнотою, допомагають краще зрозуміти матеріал.
An organization implements multiple layers of security to detect and prevent malicious activities:
All incoming and outgoing packets are inspected at Layer 3 and 4 using stateful inspection rules to block suspicious traffic.
External users accessing internal web services are routed through an intermediary server that masks their identity and logs requests.
A decoy server is placed in the internal network that mimics a vulnerable system and is actively monitored for unauthorized access attempts.
An attacker tries to scan ports and access internal resources. Logs show that:
Their IP was blocked after repeated attempts.
All their web requests were captured and traced.
They spent time interacting with a fake internal web server that alerted the security team.
Which of the following statements best describes the deployed security setup?
Отримайте необмежений доступ до відповідей на екзаменаційні питання - встановіть розширення Crowdly зараз!