During a major sale event, your online storefront begins receiving an unusually large volume of requests from many unknown sources, causing customers to experience sluggish page loads. Which approach helps sustain site responsiveness while the suspicious traffic is examined?
Activate a continuous scan of application code for lingering vulnerabilities
Implement encryption for data residing in cloud storage
Deploy filtering at the perimeter that inspects high-volume traffic and discards questionable requests
Rotate platform credentials based on a frequent schedule
Advanced inspection at the perimeter helps drop or throttle requests that appear malicious, preserving performance for legitimate users. Installing encryption and rotating credentials address different security needs but do not reduce malicious traffic. Scanning application code identifies vulnerabilities but does not curtail disruptive requests in real time.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is perimeter traffic filtering?
Open an interactive chat with Bash
How does traffic filtering help with high-volume requests?
Open an interactive chat with Bash
What methods are used to analyze suspicious traffic?
Open an interactive chat with Bash
CompTIA Cloud+ CV0-004
Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access