Free CompTIA Security+ SY0-701 Practice Question

A security administrator needs to deploy a network security device that will analyze and potentially block malicious traffic without being bypassed if it fails. Which deployment option aligns best with this requirement?

  • Set up the device as a network tap to passively monitor traffic.

  • Use port mirroring to duplicate traffic to the device.

  • Deploy the device in inline mode with fail-closed configuration.

  • Implement the device as an external monitor that gets copied traffic from a network switch.

This question's topic:
CompTIA Security+ SY0-701 / 
Security Architecture
Your Score:

Check or uncheck an objective to set which questions you will receive.