CompTIA Security+ SY0-701 Practice Question
A security administrator needs to deploy a network security device that will analyze and potentially block malicious traffic without being bypassed if it fails. Which deployment option aligns best with this requirement?
Set up the device as a network tap to passively monitor traffic.
Deploy the device in inline mode with fail-closed configuration.
Use port mirroring to duplicate traffic to the device.
Implement the device as an external monitor that gets copied traffic from a network switch.