An organization wants to gather event data from multiple locations into one location for analysis and prevent unsafe requests from reaching internal hosts. Which solution meets these goals effectively?
Place a reverse proxy that scans incoming connections and forward logs from each location into a single repository
Upgrade the current software to a new version that includes more secure defaults
Enable onsite firewalls in every location and store activity reports on each local system
Conduct daily vulnerability scans in all environments to gather potential findings and fix issues
A reverse proxy that inspects incoming connections, combined with logs from all sites collected centrally, helps detect and block suspicious traffic before it interacts with sensitive services. Local firewalls and periodic scanning can be part of a strategy, but they do not provide the traffic filtering or unified event correlation that central logging plus a proxy can offer. Replacing software addresses technology decisions, not unified logging and filtering requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.