A media-streaming company is migrating their customer portal to a new cloud infrastructure. They want to block suspicious connections from reaching internal services. Which action best achieves this outcome?
Use a routine threat intelligence platform that discovers system weaknesses periodically
Monitor incoming requests with a tool that flags traffic after activity is recorded
Configure a logging system to send information to a security analytics platform for detailed review
Set up a firewall that applies a strict policy denying connections not defined in its rules
Using a strict firewall policy blocks questionable connections before they reach sensitive components. Monitoring tools can identify issues after they occur, but this does not stop them in advance. Logging systems are helpful for audits and investigations but do not halt bad traffic. Threat intelligence scanning identifies issues but does not actively stop them at the perimeter.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a firewall and how does it block suspicious connections?
Open an interactive chat with Bash
How is a firewall different from monitoring tools or logging systems?
Open an interactive chat with Bash
What types of firewall policies are commonly used?