A team plans to embed a defensive mechanism that observes execution while code is running and halts harmful actions from within. Which strategy best meets these requirements?
Checks production activity through a module that watches traffic outside the application
Embeds detection logic in the running program to discover and block unsafe actions from within
Examines incoming requests against known attacks from outside the process environment
Implements scanning prior to deployment to identify coding flaws
A mechanism that integrates monitoring and blocking capabilities into the running code supplies internal visibility into suspicious calls. Approaches that analyze code before release or watch traffic externally can reveal vulnerabilities but do not interrupt threats within the process. Comparing requests to a common exploits list is useful yet relies on an external vantage, making it less effective at stopping emerging issues.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the main purpose of embedding detection logic in running code?
Open an interactive chat with Bash
What are the drawbacks of relying solely on external monitoring tools to detect threats?
Open an interactive chat with Bash
How does examining incoming requests against known attacks differ from embedded detection logic?