A team plans to embed a defensive mechanism that observes execution while code is running and halts harmful actions from within. Which strategy best meets these requirements?
Embeds detection logic in the running program to discover and block unsafe actions from within
Examines incoming requests against known attacks from outside the process environment
Checks production activity through a module that watches traffic outside the application
Implements scanning prior to deployment to identify coding flaws
A mechanism that integrates monitoring and blocking capabilities into the running code supplies internal visibility into suspicious calls. Approaches that analyze code before release or watch traffic externally can reveal vulnerabilities but do not interrupt threats within the process. Comparing requests to a common exploits list is useful yet relies on an external vantage, making it less effective at stopping emerging issues.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of embedding detection logic in running programs?
Open an interactive chat with Bash
How does embedded detection differ from external monitoring?
Open an interactive chat with Bash
Why is examining requests against known attacks insufficient to stop threats?