CompTIA Security+ SY0-701 Practice Question
A security administrator needs to deploy a network security device that will analyze and potentially block malicious traffic without being bypassed if it fails. Which deployment option aligns best with this requirement?
Implement the device as an external monitor that gets copied traffic from a network switch.
Set up the device as a network tap to passively monitor traffic.
Deploy the device in inline mode with fail-closed configuration.
Use port mirroring to duplicate traffic to the device.