✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
An organization implements multiple layers of security to detect and prevent malicious activities:
All incoming and outgoing packets are inspected at Layer 3 and 4 using stateful inspection rules to block suspicious traffic.
External users accessing internal web services are routed through an intermediary server that masks their identity and logs requests.
A decoy server is placed in the internal network that mimics a vulnerable system and is actively monitored for unauthorized access attempts.
An attacker tries to scan ports and access internal resources. Logs show that:
Their IP was blocked after repeated attempts.
All their web requests were captured and traced.
They spent time interacting with a fake internal web server that alerted the security team.
Which of the following statements best describes the deployed security setup?
Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!